How can access be restricted in the context of information security, without using group membership seenagape 11 years ago How can access be restricted in the context of information security, without using group membership or role attributes? A.Individual identity B.Host network address C.HBA World Wide Name D.Shared Testwords ← Previous question Next question →