Sara, a security administrator, has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?

A. Mandatory Access Controls
B. Time-based Access Controls
C. Discretionary Access Controls
D. Role Based Access Controls


Answer: A. Mandatory Access Controls

Computer Science & Information Technology

You might also like to view...

Which of the following is a format mark that indicates the tab stop?

A.
B.
C.
D.

Computer Science & Information Technology

________ refers to graphics, sound, and animation that are used to entertain or inform an audience

Fill in the blank(s) with correct word

Computer Science & Information Technology

Tethering allows the sharing of

A) Hardware and software with other mobile devices in nearby areas B) Access only through a wired connection with other devices C) An Internet connection from an airplane in a nearby area D) An Internet connection with other mobile devices in the nearby area

Computer Science & Information Technology

Solve the following system using the substitution method or the linear combination method. If there are infinitely many solutions or no solution, so indicate.

What will be an ideal response?

Computer Science & Information Technology