How can access be restricted in the context of information security, without using group membership seenagape 12 years ago How can access be restricted in the context of information security, without using group membership orroleattributes? A.Individual identity B.Host network address C.HBA World Wide Name D.Shared Testwords ← Previous question Next question →