PrepAway - Latest Free Exam Questions & Answers

The secure path between a user and the Trusted Computing Base (TCB) is called:

The secure path between a user and the Trusted Computing Base (TCB) is called:

PrepAway - Latest Free Exam Questions & Answers

A.
Trusted facility management

B.
Trusted distribution

C.
Trusted path

D.
The security perimeter

Explanation:
Answer trusted distribution ensures that valid and secure versions of software have been received
correctly. Trusted facility management, answer “Trusted facility management”, is concerned with
the proper operation of trusted facilities as well as system administration and configuration. Answer
“The security perimeter”, the security perimeter, is the boundary that separates the TCB from the

remainder of the system. Recall that the TCB is the totality of protection mechanisms within a
computer system that are trusted to enforce a security policy.


Leave a Reply