What are the two mechanisms that can be employed toaddress threats of user identity spoofing?

A.
Access Control Lists (ACLs) and access control tostorage objects
B.
Access control to storage objects and storage access monitoring
C.
User authentication and Information Rights Management (IRM)
D.
User authentication and user authorization