CISSP: Security Models
Calculating your score ...
Click your answer, then NEXT and END when you are done to find out how you got on!
1 of 10
1. In Trusted Computer Base, the reference monitor can use capability lists, which best defines these:
Used to send security attributes before access is requested
Used in highly-secure system and offers permanence
Provides a fast method of lookup for rights