_______ is an approach to restricting system access to authorized users.
(a) Role-based access control
(b) Process-based access control
(c) Job-based access control
(d) None of the mentioned
I have been asked this question in a national level competition.
Question is from Protection Concepts in division Protection of Operating System