In what security mode can a system be operating if all users have the clearance or authorization
and need-to-know to all data processed within the system?
A.
Dedicated security mode.
B.
System-high security mode.
C.
Compartmented security mode.
D.
Multilevel security mode.
Explanation:
An information-system (IS) security mode of operation wherein each user with direct
or indirect access to the system, its peripherals, remote terminals, or remote hosts, has all of the
following: (a) a valid security clearance for all information within the system; (b) formal access
approval and signed nondisclosure agreements for all the information stored and/or processed
(including all compartments, sub compartments, and/or special access programs); and (c) a validneed-to-know for all information contained within the IS. When in the dedicated security mode, a
system is specifically and exclusively dedicated to and controlled for the processing of one
particular type or classification of information, either for full-time operation or for a specified period
of time.
check
0
0