Which of the following statements best describes the Biba security model?

A) No read up, no write up
B) No write up, no write down
C) No read up, no write down
D) No read down, no write up

D) No read down, no write up

Computer Science & Information Technology

You might also like to view...

________ consists of testing an application with a user prior to releasing an application for wider use

Fill in the blank(s) with correct word

Computer Science & Information Technology

Pointing to a sizing handle of a chart allows you to move it. __________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology