Malicious code that enters a computer by means of a freely distributed game that is intentionally installed and played is known as:
Choose the access control model that allows access control determinations to be performed based on the security labels associated with each user and each data item.
Which of the following network authentication protocols uses symmetric key cryptography, stores a shared key for each network resource and uses a Key Distribution Center (KDC)?