Which piece of the Trusted Computing Base's security system manages access controls?

A. trusted computing base
B. reference monitor
C. covert channel
D. verification module

Answer: B

Computer Science & Information Technology

You might also like to view...

Where do the column headings display in a crosstab query?

A) Along the right side of a crosstab query B) Along the top of a crosstab query C) Along the left side of a crosstab query D) Along the bottom of a crosstab query

Computer Science & Information Technology

What are the benefits of grouping worksheets?

What will be an ideal response?

Computer Science & Information Technology