Which of the following describes a logical form of separation used by secure computing systems?
A . Processes use different levels of security for input and output devices.
B . Processes are constrained so that each cannot access objects outside its permitted domain.
C . Processes conceal data and computations to inhibit access by outside processes.
D . Processes are granted access based on granularity of controlled objects.
Answer: B
Explanation: Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.
Latest SSCP Dumps Valid Version with 1074 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund