A security administrator has been tasked to ensure access to all network equipment is controlled
by a central server such as TACACS+. This type of implementation supports which of the following
risk mitigation strategies?
A.
User rights and permissions review
B.
Change management
C.
Data loss prevention
D.
Implement procedures to prevent data theft