Which of the following best described the Bell-Lapadula security model?

A. No read up and read down
B. No write up and no read up
C. No read up and no write down
D. No read down and no write up


Answer: C
Explanation: The Bell-Lapadula model ensures confidentiality and restricts users to read data above their level and to write data below their security level. It was developed in the 1970s for the U.S. military.

Computer Science & Information Technology

You might also like to view...

Apply the looping rules to accomplish the specified processing. Assume that the value of the variable n is equal to zero as the loop begins.

What condition will allow a DO WHILE loop to repeat until the variable n is greater than zero?

Computer Science & Information Technology

Another work for edit is clean or:? ?

A. Wipe? B. Wash? C. ?Scrub D. ?Polish

Computer Science & Information Technology

If your list of sources becomes ____________________ when you select the heading Bibliography, this indicates the Bibliography field is active.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When you edit a document that has the Track Changes feature enabled, Word marks all text or graphics that you insert, delete, or modify and refers to the revisions as ____.

A. tracks B. markups C. status marks D. tool marks

Computer Science & Information Technology