Site icon Exam4Training

Which of the following describes a logical form of separation used by secure computing systems?

Which of the following describes a logical form of separation used by secure computing systems?
A .  Processes use different levels of security for input and output devices.
B .  Processes are constrained so that each cannot access objects outside its permitted domain.
C .  Processes conceal data and computations to inhibit access by outside processes.
D .  Processes are granted access based on granularity of controlled objects.

Answer: B

Explanation: Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.

Latest SSCP Dumps Valid Version with 1074 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version