After a breach in your organization resulted in the public release of top secret information, the company implemented a MAC which enforces no read-up, a MAC which enforces no write-down, and a DAC which uses an access matrix. What is the property that has been implemented with the no read-up MAC?
A. simple security property
B. star property
C. discretionary security property
D. strong star property
A
Explanation: The Bell–LaPadula model defines two mandatory access control (MAC) rules and one discretionary access control (DAC) rule with three security properties. The following properties have been implemented in this scenario:
• No read-up MAC = simple security property
• No write down MAC = star property
• DAC using an access control matrix = discretionary security property
You might also like to view...
You can leave notes open to the screen while you continue using Outlook, or you can close them and view them in the ____ window.
A. Notes B. Navigation C. Prioritized D. Extras
What type of entity is used to represent repeating groups?
A) fundamental entity B) associative entity C) attributive entity D) iterative entity
Which of the following is NOT a hint to improve the organization of your files?
A. Always store your data in a folder. B. Try to store files directly in the folders that contain program modules for your application software. C. Use descriptive names for files and folders. D. Create subfolders to group files by project or by type.
You add multiple RadioButtons to a(n) ______________ to ensure that only one RadioButton in a given group is selected at a time.
Fill in the blank(s) with the appropriate word(s).