Which of the following describes a logical form of separation used by secure computing systems?

Last Updated on April 10, 2022 by Admin 3

Which of the following describes a logical form of separation used by secure computing systems?

  • Processes use different levels of security for input and output devices.
  • Processes are constrained so that each cannot access objects outside its permitted domain.
  • Processes conceal data and computations to inhibit access by outside processes.
  • Processes are granted access based on granularity of controlled objects.
Explanation:
Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation. 
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments