Which piece of the Trusted Computing Base's security system manages access controls?
A. trusted computing base
B. reference monitor
C. covert channel
D. verification module
Answer: B
You might also like to view...
To form a cryptographic system using __________ we need to find a "hard-problem" corresponding to factoring the product of two primes or taking the discrete logarithm.
Fill in the blank(s) with the appropriate word(s).
Kristen uses macros in her daily work as a sales representative at a plumbing company. She often needs to create workbooks with macros for her co-workers and is always trying to make them as efficient as possible. If Kristen wants to calculate bonuses for other sales representatives based on their ratings, she could use a(n) ____ statement to check for a condition that determines what actions the procedure will take.
What will be an ideal response?
Identify the letter of the choice that best matches the phrase or definition.
A. Colored horizontal bars that visually illustrate differences between values in a range of cells B. Has a default value of 8.43 characters, a little less than one inch. C. The name for a collection of characters with a similar, specific design. D. Equal to 1/72 of an inch. E. A predefined set of attributes that gives your Excel worksheet a professional look.
A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet?
A. ISDN B. Cable modem C. DSL D. Dial-up networking