Which of the following options is an approach to restricting system access to authorized users? seenagape 11 years ago Which of the following options is an approach to restricting system access to authorized users? A.DAC B.MIC C.RBAC D.MAC ← Previous question Next question →