What characteristic of a trusted process does not allow users unrestricted access to sensitive data?
A.
*-property rule
B.
Simple security rule
C.
Need-to-know
D.
TCB
Explanation:
A system that enforces need-to-know does not allow subjects to access objects unless they have been granted formal approval, which is based on a need-to-know. This question is targeting MAC-based systems that would use security labels,clearances, and classifications also in their access criteria.