A system that hides the activities of high-privilege users from low-privilege users employs the model known as:
a. Non-interference
b. Compartmented
c. Access matrix
d. Biba
a. Non-interference
Computer Science & Information Technology
You might also like to view...
An icon that displays on the Ribbon to indicate the key that you can press to access Ribbon commands
A) ToolTip B) KeyTip C) ScreenTip
Computer Science & Information Technology
Which of the following is not a category of disaster?
A. Fire B. Flood C. Successful malicious attack D. Pretexting
Computer Science & Information Technology