Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?
A. Scope-based
B. Role-based
C. Location-based
D. Rule-based
A. Scope-based
B. Role-based
C. Location-based
D. Rule-based