SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start


From course:

CISSP

» Start this Course
(Practice similar questions for free)
Question:

Security Kernel

Author: John Intindolo



Answer:

The ______ invokes all the rules that control access to resources (ie. allow or deny access) - Security Kernel - Reference Monitor - Security Policy - Trusted Computing Base (TCB)


0 / 5  (0 ratings)

1 answer(s) in total