Users require access to a certain server depending on their job function. Which of the following would be the
MOST appropriate strategy for securing the server?

A.
Common access card
B.
Role based access control
C.
Discretionary access control
D.
Mandatory access control
Explanation:
Role-based Access Control is basically based on a user’s job description. When a user is assigned a specific
role in an environment, that user’s access to objects is granted based on the required tasks of that role.