Which of the following best described the Bell-Lapadula security model?
A. No read up and read down
B. No write up and no read up
C. No read up and no write down
D. No read down and no write up
Answer: C
Explanation: The Bell-Lapadula model ensures confidentiality and restricts users to read data above their level and to write data below their security level. It was developed in the 1970s for the U.S. military.
You might also like to view...
Apply the looping rules to accomplish the specified processing. Assume that the value of the variable n is equal to zero as the loop begins.
What condition will allow a DO WHILE loop to repeat until the variable n is greater than zero?
Another work for edit is clean or:? ?
A. Wipe? B. Wash? C. ?Scrub D. ?Polish
If your list of sources becomes ____________________ when you select the heading Bibliography, this indicates the Bibliography field is active.
Fill in the blank(s) with the appropriate word(s).
When you edit a document that has the Track Changes feature enabled, Word marks all text or graphics that you insert, delete, or modify and refers to the revisions as ____.
A. tracks B. markups C. status marks D. tool marks