Which of the following options is an approach to restricting system access to authorized users?

Which of the following options is an approach to restricting system access to authorized users?

Which of the following options is an approach to restricting system access to authorized users?

A.
DAC

B.
MIC

C.
RBAC

D.
MAC



Leave a Reply 0

Your email address will not be published. Required fields are marked *