For the purpose of optimizing access security, which of the following is the most appropriate ?
A . Ensure that sensitive management information is not stolen illegally
B . Prevent and reduce external network attacks and harm
C . Ensure the access security of key business
D . Realize user’s secure access control
Answer: D