Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
The part of the TCB (trusted computing base) that validates access to every resource prior to granting access requests is the ________
kernel
trusted path
security perimeter
reference monitor
Reference monitor is between all subjects and objects verifying that a subject is authorized to access an object. Security perimeter is the boundary that separates the TCB from the rest of the system Kernel is what the TCB is protecting - the core of the computer Trusted path - secure channels to enable the TCB to communicate with the rest of the system Source: ISC2 CISSP Official Study Guide 8th Edition
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.