A(n) _________ is a formal access control methodology used to assign a level of confidentiality to an information asset and thus restrict the number of people who can access it.. Question 45 options: a) security clearance scheme b) data recovery scheme c) risk management scheme d) data classification scheme