Which form of access control is specifically designed to adapt in real-time to the perceived threat level, improving the security stance by continuously evaluating the risk and context associated with user access requests?
Discretionary access control (DAC)
Mandatory access control (MAC)
Role-based access control (RBAC)
Adaptive Policy-driven access control