Which of the following security controls works as the totality of protection mechanisms within a
computer system, including hardware, firmware, and software, the combination of which is
responsible for enforcing a security policy
A.
Trusted computing base (TCB)
B.
Common data security architecture (CDSA)
C.
Internet Protocol Security (IPSec)
D.
Application program interface (API)