Which of the following is the MOST effective solution for preventing internal users from modifying
sensitive and classified information?
A.
Baseline security standards
B.
System access violation logs
C.
Role-based access controls
D.
Exit routines
Explanation:
Role-based access controls help ensure that users only have access to files and systems
appropriate for their job role. Violation logs are detective and do not prevent unauthorized access.
Baseline security standards do not prevent unauthorized access. Exit routines are dependent
upon appropriate role-based access.