The secure path between a user and the Trusted Computing Base (TCB)
is called:

A.
Trusted facility management
B.
Trusted distribution
C.
Trusted path
D.
The security perimeter
Explanation:
Answer trusted distribution ensures that valid and secure
versions of software have been received correctly. Trusted facility
management, answer “Trusted facility management”, is concerned with the proper operation of
trusted facilities as well as system administration and configuration.
Answer “The security perimeter”, the security perimeter, is the boundary that separates the TCB
from the remainder of the system. Recall that the TCB is the totality of protection mechanisms
within a computer system that are trusted to enforce a security policy.