After Ann, a user, logs into her banking websites she has access to her financial institution
mortgage, credit card, and brokerage websites as well. Which of the following is being described?

A.
Trusted OS
B.
Mandatory access control
C.
Separation of duties
D.
Single sign-on
Explanation: