Which of the following provides controlled and unintercepted interfaces into privileged user functions?

A.
Ring protection
B.
Anti-malware
C.
Maintenance hooks
D.
Trusted paths
Explanation:
D: Ring protection can be used to enforce boundary control between kernel functions and end-user controls. Anti-malware software is used to protect against malicious software. Maintenance hooks are coding constructs written by the software developer for troubleshooting and impersonation purposes, but can be a potential backdoor for malicious software. Trusted paths provide trustworthy interfaces into privileged
user functions and are intended to provide a way to ensure that any communications over that path cannot be intercepted or corrupted. Page 544.
Trusted paths provide trustworthy interfaces into privileged
user functions and are intended to provide a way to ensure that any communications over that path cannot be intercepted or corrupted.
Ring protection can be used to enforce boundary control between kernel functions and end-user controls. Anti-malware software is used to protect against malicious software. Maintenance hooks are coding constructs written by the software developer for troubleshooting and impersonation purposes, but can be a potential backdoor for malicious software.
0
0