Question:
Security Kernel
Author: John IntindoloAnswer:
The ______ invokes all the rules that control access to resources (ie. allow or deny access) - Security Kernel - Reference Monitor - Security Policy - Trusted Computing Base (TCB)
0 / 5 Â (0 ratings)
1 answer(s) in total