Which of the following is an approach to restricting system access to authorized users? admin 9 years ago Which of the following is an approach to restricting system access to authorized users? A.DAC B.MIC C.RBAC D.MAC ← Previous question Next question →