Calculating your score ...
Click your answer, then NEXT and END when you are done to find out how you got on!
1 of 40
1. In Trusted Computer Base, the reference monitor can use security labels, which best defines these:
Provides a fast method of lookup for rights
Used in highly-secure system and offers permanence
Used to send security attributes before access is requested