Answer:
Option A i.e., Access control list.
Explanation:
His supervisor is worried that perhaps the surveillance system for the corporation would not meet the latest requirements in which the corporation has chosen to hire. She has informed Derek to decide how often the server authenticates organization representatives.
Thus, Use of the system or network to validate connection on the server to a particular resource which is the Access control list.
So, the other options are not correct according to the given scenario.