Which of the following is an approach to restricting system access to authorized users? admin 10 years ago Which of the following is an approach to restricting system access to authorized users? A.DAC B.MIC C.RBAC D.MAC ← Previous question Next question →