After reviewing its business processes, a large organization is deploying a new web application based on a VoIP technology. Which of the following is the MOST appropriate approach for implementing access control that will facilitate security management of the VoIP web application? 
A、Fine-grained access control 
B、Role-based access control (RBAC) 
C、Access control lists 
D、Network/service access control 
							
