application. The operator is denied access to the financial and project management applications by the
system's security configuration. Which of the following BEST describes the security principle in use?
A. Network access control
B. Least privilege
C. Multifactor authentication
D. Separation of duties