Which of the following security mechanisms encompasses all of the components that are responsible for enforcing the established security policy?
A.
TCB
B.
Reference monitor
C.
Bell-LaPadula model
D.
Multilevel security policy
Explanation:
The trusted computing base (TCB) consists of software, hardware,
firmware, and processes within a computer that are designed to enforce a security
policy.