The concept that all accesses must be meditated, protected from modification, and verifiable as correct is the concept of

The concept that all accesses must be meditated, protected from modification, and verifiable as
correct is the concept of

The concept that all accesses must be meditated, protected from modification, and verifiable as
correct is the concept of

A.
Secure model

B.
Security locking

C.
Security kernel

D.
Secure state

Explanation:
A security kernel is defined as the hardware, firmware, and software elements of a
trusted computing base that implements the reference monitor concept. A reference monitor is a

system component that enforces access controls on an object. Therefore, the reference monitor
concept is an abstract machine that mediates all access of subjects to objects. The Security
Kernel must:
Mediate all accesses
Be protected from modification
Be verified as correct.
-Ronald Krutz The CISSP PREP Guide (gold edition) pg 262



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Jamal Ahmed

Jamal Ahmed

check