Which of the following security models add programs to the subjects and objects?

a. Biba Integrity Model
b. Clark-Wilson Model
c. Chinese Wall Model
d. Bell-LaPadula Model


ANS: B

Computer Science & Information Technology

You might also like to view...

The linear search algorithm runs in ________time.

a. quadratic b. O(n) c. constant d. nonlinear

Computer Science & Information Technology

A software _____ is a legal contract that defines the ways in which you may use a computer program.

A. registration B. agreement C. license D. authorization

Computer Science & Information Technology

This provides the same type of security features as SSL including integrity, authentication and confidentiality but uses the UDP protocol.

What will be an ideal response?

Computer Science & Information Technology

A column that will always have a different value is a _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology