Final answer:
The correct security control for James to give Sally access to a specific opportunity she currently can't access is sharing rules. These allow record access to be extended based on certain criteria, providing a targeted and effective means of collaboration within a CRM system.
Step-by-step explanation:
The appropriate security control to use when James at Radnip Studios wants to give Sally access to an opportunity that she currently doesn't have access to is a. Sharing Rules. Sharing rules in Customer Relationship Management (CRM) systems like Salesforce allow users to grant access to records to other users who do not have access through their role or profile. Sharing rules can be based on record ownership, criteria, or as part of a team collaboration. Other options like Permission Sets are used to extend users' access rights without changing their primary profile, Field-level Security controls access to specific fields within records, and Role Hierarchy provides access control based on a user's position in the organization. However, for granting access to a particular record (like an opportunity), sharing rules are the most direct and appropriate method.