Which of the following is the purpose of access security optimization?
A . To ensure that sensitive management information will not be intercepted.
B . To prevent or reduce external network attacks and harm.
C . To ensure secure access to key services.
D . To achieve secure user access control.
Answer: D