Which of the following is an access control method that organizations can use to prevent unauthorized access?
Bring Your Own Device (BYOD)
Man-in-the-Middle (MITM)
Token-based authentication
Digital verification
Submit