Which of the following is a supporting technology that can be used to protect sensitive physical information?

A. Access control.
B. Vaulting.
C. Time locks.
D. All of the above.