___________ allows administrators to define and limit the resources and operations that a user can access.
(a) Access
(b) Authentication
(c) Authorization
(d) All of the mentioned
(a) Access
(b) Authentication
(c) Authorization
(d) All of the mentioned
Correct option is (c) Authorization
For explanation: Using authentication and authorization is a key part of a complete security strategy.