Which of the following is described as an approach to network security in which each administrator is given sufficient privileges only within a limited scope of responsibility?
a. Defense in depth
b. Fail-safe
c. Separation of duties
d. Simplicity