The security model with no read-down and no write-up is:
a. Multilevel
b. Clark-Wilson
c. Bell-LaPadula
d. Biba
A system that hides the activities of high-privilege users from low-privilege users employs the model known as:
a. Non-interference
b. Compartmented
c. Access matrix
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here