Which risk mitigation technique refers to the process of reviewing which users have or have not been able to perform a certain task, or access a certain resource? A) Risk assessment. B) Access control. C) Penetration testing. D) Vulnerability scanning.