Which of the following security solutions can be used to protect database contents? (Select all that apply.)
A. Encryption
B. Firewalls
C. Access controls
D. Antivirus software