Describe the MAC lattice model.
What will be an ideal response?
Different "rungs" on the MAC lattice model have different security levels, and subjects are assigned a "rung" on the lattice just as objects are. Multiple lattices can even be placed beside each other to allow for different groups of labels. For example, one subject label lattice could use the clearances confidential, secret, and top secret, while a corresponding subject label lattice could use public, restricted, and top clearance. The rungs of each subject lattice would still align with the rungs on the object security lattice.
You might also like to view...
Microsoft DOS limits program names to _____ characters.
A. ten B. twelve C. eight D. six
To apply the formatting of a given cell to a range of cells, you click the ________ button in the Clipboard group
Fill in the blank(s) with correct word
Which of the following layers of the OSI model is responsible for routing the information in the network?
a. Transport layer b. Network layer c. Session layer d. Physical layer
The valid values for the float property are top and bottom, indicating where to display (or float) the element.
a. true b. false