Last Updated on April 10, 2022 by Admin 3
Which of the following describes a logical form of separation used by secure computing systems?
- Processes use different levels of security for input and output devices.
- Processes are constrained so that each cannot access objects outside its permitted domain.
- Processes conceal data and computations to inhibit access by outside processes.
- Processes are granted access based on granularity of controlled objects.
Explanation:
Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.