Asantetaedog2865 Asantetaedog2865 28-03-2024 Computers and Technology contestada A company wants to protect its IT system from unauthorized users accessing the system. Which of the following controls would best serve to mitigate this risk? A. A keystroke log.B. A transaction log. C. A biometric device. D. Public key encryption.