ISC Exam Questions

Which of the following options is an approach to restricting system access to authorized users?

Which of the following options is an approach to restricting system access to authorized users?

A.
DAC

B.
MIC

C.
RBAC

D.
MAC