Which risk mitigation technique refers to the process of reviewing which users have or have not been able to perform a certain task, or access a certain resource?
A) Risk assessment.
B) Access control.
C) Penetration testing.
D) Vulnerability scanning.