An analyst was investigating the attack that took place on the network. A user was able to access the system without proper authentication.
Which of the following will the analyst recommend, related to management approaches, in order to control access? (Choose three.)
A . RBAC
B . LEAP
C . DAC
D . PEAP
E . MAC
F . SCAP
G . BCP
Answer: ACE