PrepAway - Latest Free Exam Questions & Answers

The secure path between a user and the Trusted Computing Base (TCB) is called:

The secure path between a user and the Trusted Computing Base (TCB)
is called:

PrepAway - Latest Free Exam Questions & Answers

A.
Trusted facility management

B.
Trusted distribution

C.
Trusted path

D.
The security perimeter

Explanation:
Answer trusted distribution ensures that valid and secure
versions of software have been received correctly. Trusted facility
management, answer “Trusted facility management”, is concerned with the proper operation of
trusted facilities as well as system administration and configuration.
Answer “The security perimeter”, the security perimeter, is the boundary that separates the TCB
from the remainder of the system. Recall that the TCB is the totality of protection mechanisms
within a computer system that are trusted to enforce a security policy.


Leave a Reply