To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
A) access controls.
B) an authorization management system.
C) security tokens.
D) an authorization policy.