Answer:
"Option a, c, and d" is the correct answer to this question.
Explanation:
It is a safety model, that blocks or restricts unauthorized programs in aspects that negatively impact data. It monitors the applications by providing verification, identification, entry, etc.