Which form of access control is specifically designed to adapt in real-time to the perceived threat level, improving the security stance by continuously evaluating the risk and context associated with user access requests?
Role-based access control (RBAC)
Mandatory access control (MAC)
Adaptive Policy-driven access control
Discretionary access control (DAC)