A security analyst implemented group-based privileges within the company active directory. Which
of the following account management techniques should be undertaken regularly to ensure least
privilege principles?

A.
Leverage role-based access controls.
B.
Perform user group clean-up.
C.
Verify smart card access controls.
D.
Verify SHA-256 for password hashes.