正解:B
The primary role of Identity and Access Management (IAM) is to control and manage who has access to cloud resources and ensure that only authorized users, systems, or entities are granted access. IAM involves the creation, management, and enforcement of policies that define user identities and their corresponding permissions to access specific resources. This helps prevent unauthorized access and ensures that security policies are properly enforced.
While encryption and activity monitoring are important security practices, they are not the primary focus of IAM. Similarly, IAM is about assigning appropriate access levels based on roles and needs, not ensuring all users have the same level of access.