Which of the following TCB techniques involves viewing system components at a high level and
ignoring or segregating its specific details?
A.
Trusted computer system
B.
Security perimeter
C.
Abstraction
D.
Trusted path
Explanation:
Which of the following TCB techniques involves viewing system components at a high level and
ignoring or segregating its specific details?
Which of the following TCB techniques involves viewing system components at a high level and
ignoring or segregating its specific details?
A.
Trusted computer system
B.
Security perimeter
C.
Abstraction
D.
Trusted path
Explanation: