Of the following, the BEST method for ensuring that temporary employees do not receive excessive access
rights is:

A.
mandatory access controls.
B.
discretionary access controls.
C.
lattice-based access controls.
D.
role-based access controls.
Explanation:
Role-based access controls will grant temporary employee access based on the job function to be performed.
This provides a better means of ensuring that the access is not more or less than what is required.
Discretionary, mandatory and lattice-based access controls are all security models, hut they do not address the issue of temporary employees as well as role-based access controls.