A system that hides the activities of high-privilege users from low-privilege users employs the model known as:

a. Non-interference
b. Compartmented
c. Access matrix
d. Biba

a. Non-interference

Computer Science & Information Technology

You might also like to view...

An icon that displays on the Ribbon to indicate the key that you can press to access Ribbon commands

A) ToolTip B) KeyTip C) ScreenTip

Computer Science & Information Technology

Which of the following is not a category of disaster?

A. Fire B. Flood C. Successful malicious attack D. Pretexting

Computer Science & Information Technology