Which of the following security models add programs to the subjects and objects?
a. Biba Integrity Model
b. Clark-Wilson Model
c. Chinese Wall Model
d. Bell-LaPadula Model
ANS: B
Computer Science & Information Technology
You might also like to view...
The linear search algorithm runs in ________time.
a. quadratic b. O(n) c. constant d. nonlinear
Computer Science & Information Technology
A software _____ is a legal contract that defines the ways in which you may use a computer program.
A. registration B. agreement C. license D. authorization
Computer Science & Information Technology
This provides the same type of security features as SSL including integrity, authentication and confidentiality but uses the UDP protocol.
What will be an ideal response?
Computer Science & Information Technology
A column that will always have a different value is a _______.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology