which of the following?

The trusted computing base controls which of the following?

The trusted computing base controls which of the following?

A.
All trusted processes and software components

B.
All trusted security policies and implementation mechanisms

C.
All trusted software and design mechanisms

D.
All trusted software and hardware components

Explanation:
The TCB contains and controls all protection mechanisms within the system, whether they are software, hardware, or firmware.



Leave a Reply 0

Your email address will not be published. Required fields are marked *