A trusted system does NOT involve which of the following?
A . Enforcement of a security policy.
B . Sufficiency and effectiveness of mechanisms to be able to enforce a security policy.
C . Assurance that the security policy can be enforced in an efficient and reliable manner.
D . Independently-verifiable evidence that the security policy-enforcing mechanisms are sufficient and effective.
Answer: C
Explanation: A trusted system is one that meets its intended security requirements. It involves sufficiency and effectiveness, not necessarily efficiency, in enforcing a security policy. Put succinctly, trusted systems have (1) policy, (2) mechanism, and (3) assurance.
Source: HARE, Chris, Security Architecture and Models, Area 6 CISSP Open Study Guide, January 2002.
Latest SSCP Dumps Valid Version with 1074 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund