The trusted computing base controls which of the following?
A.
All trusted processes and software components
B.
All trusted security policies and implementation mechanisms
C.
All trusted software and design mechanisms
D.
All trusted software and hardware components
Explanation:
The TCB contains and controls all protection mechanisms within the system, whether they are software, hardware, or firmware.