A user is able to access shares that store confidential information that is not related to the user’s current job duties. Which of the following should be implemented
to prevent this from occurring?

A.
Authorization
B.
Authentication
C.
Federation
D.
Identification