Which of the following options is an approach to restricting system access to authorized users? seenagape 10 years ago Which of the following options is an approach to restricting system access to authorized users? A.DAC B.MIC C.RBAC D.MAC ← Previous question Next question →