Which of the following statements best describes the Biba security model?
A. No read up and write up
B. No write up and no write down
C. No read up and no write down
D. No read down and no write up
Answer: D
Explanation: The Biba model objective is to ensure data integrity. The model works on the principle of restricting users to read data at lower than their level and to write data at higher than their security level. This model was designed in the 1970s for the U.S. military.
You might also like to view...
If someone wanted to broadcast a copy of a video presentation, is a circuit switching system or a packet switching preferable? Why?
What will be an ideal response?
Clicking ________ is how users "like" a post on Google+
Fill in the blank(s) with correct word
In the Word Options dialog box, All Commands can be found from the ________ box
A) Choose commands from B) Add C) New Group D) Customize the ribbon
The related data values used in creating a chart are called ________
A) a legend B) category labels C) data series D) value labels