Which of the following can the government agency deploy to meet future security needs?

A breach at a government agency resulted in the public release of top secret information. The
Chief Information Security Officer has tasked a group of security professionals to deploy a system
which will protect against such breaches in the future.
Which of the following can the government agency deploy to meet future security needs?

A breach at a government agency resulted in the public release of top secret information. The
Chief Information Security Officer has tasked a group of security professionals to deploy a system
which will protect against such breaches in the future.
Which of the following can the government agency deploy to meet future security needs?

A.
A DAC which enforces no read-up, a DAC which enforces no write-down, and a MAC which
uses an access matrix.

B.
A MAC which enforces no write-up, a MAC which enforces no read-down, and a DAC which
uses an ACL.

C.
A MAC which enforces no read-up, a MAC which enforces no write-down, and a DAC which
uses an access matrix.

D.
A DAC which enforces no write-up, a DAC which enforces no read-down, and a MAC which
uses an ACL.



Leave a Reply 0

Your email address will not be published. Required fields are marked *