Which of the following MOST effectively prevents internal users from modifying sensitive data?
A. Network segmentation
B. Acceptable use policies
C. Role-based access controls
D. Multi-factor authentication
A. Network segmentation
B. Acceptable use policies
C. Role-based access controls
D. Multi-factor authentication