The three operating system security layers are: physical hardware, operating system kernel, and _________

What will be an ideal response?

user applications and utilities

Business

You might also like to view...

How would you describe a transformational leader?

Business

Protected group employees are classes of employees who have been afforded protection by supervisory management

Indicate whether the statement is true or false

Business