____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential, Top Secret, etC..
A.
MAC – Mandatory Access Control
B.
DAC – Discretionary Access Control
C.
SAC – Strategic Access Control
D.
LAC – Limited Access Control