What can be described as an imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?
What can be described as an imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?
A . The security kernel
B . The reference monitor
C . The security perimeter
D . The reference perimeter
Answer: C
Explanation: The security perimeter is the imaginary line that separates the trusted components of the kernel and the Trusted Computing Base (TCB) from those elements that are not trusted. The reference monitor is an abstract machine that mediates all accesses to objects by subjects. The security kernel can be software, firmware or hardware components in a trusted system and is the actual instantiation of the reference monitor. The reference perimeter is not defined and is a distracter.
Source: HARE, Chris, Security Architecture and Models, Area 6 CISSP Open Study Guide, January 2002.
Latest SSCP Dumps Valid Version with 1074 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund