Which of the following is one of the requirements for a system to receive a B1 security rating?

a. Discretionary access control
b. Mandatory access control for all operations
c. Hierarchical device labels
d. Zero design flaws in the TCB


ANS: B

Computer Science & Information Technology

You might also like to view...

A typical pin includes all of the following elements EXCEPT ________

A) the name of the user who pinned the image B) a short text description from the user who pinned the image C) the image that is pinned D) the email address of the user who pinned the image

Computer Science & Information Technology

The Increase Font Size button increases the size of all fonts by the same number of points

Indicate whether the statement is true or false

Computer Science & Information Technology

Which one of these is not a file used with the User State Migration Tool?

a. ScanState.exe b. RunState.exe c. MigUser.xml d. MigApp.xmo

Computer Science & Information Technology

A graphics program is used to prepare pictures, charts, maps and diagrams to analyze trends, summarize data, and show relationships visually.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology