Which piece of the Trusted Computing Base's security system manages access controls?
A. trusted computing base
B. reference monitor
C. covert channel
D. verification module
Answer: B
Computer Science & Information Technology
You might also like to view...
Where do the column headings display in a crosstab query?
A) Along the right side of a crosstab query B) Along the top of a crosstab query C) Along the left side of a crosstab query D) Along the bottom of a crosstab query
Computer Science & Information Technology
What are the benefits of grouping worksheets?
What will be an ideal response?
Computer Science & Information Technology