Regarding the purpose of managing security optimization, which of the following is the most appropriate?
A . Ensure that sensitive management information is not stolen illegally
B . Prevent/reduce external network attacks and harm
C . Ensure the access security of key business
D . Realize user’s secure access control
Answer: A