Which of the following is the MOST effective solution for preventing internal users from modifying sensitive and classified information?
A. Baseline security standards
B. System access violation logs
C. Role-based access controls
D. Exit routines
A. Baseline security standards
B. System access violation logs
C. Role-based access controls
D. Exit routines