CWNP Exam Questions

Which of the following is an approach to restricting system access to authorized users?

Which of the following is an approach to restricting system access to authorized users?

A.
DAC

B.
MIC

C.
RBAC

D.
MAC