The three operating system security layers are: physical hardware, operating system kernel, and _________
What will be an ideal response?
user applications and utilities
Business
What will be an ideal response?
user applications and utilities