A security administrator implements access controls based on the security classification of the
data and need-to-know information. Which of the following BEST describes this level of access
control?
A.
Implicit deny
B.
Role-based Access Control
C.
Mandatory Access Controls
D.
Least privilege