Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
The Trusted Computing Security Evaluation criteria (TCSEC) was developed to assess and satisfy trust requirements for applications. Using TCSEC section C2 - Controlled Access Protection includes all of these uses EXCEPT?
Notification of security level changes
Protected system mode of operation
Object reuse protection
Object protection for single-user basis
The correct response is notification of security level changes. Security level changes are used in B2 - Structured Protection of the TCSEC not the controlled access protection. C – Discretionary protection[edit] C1 – Discretionary Security Protection Identification and authentication Separation of users and data Discretionary Access Control (DAC) capable of enforcing access limitations on an individual basis Required System Documentation and user manuals C2 – Controlled Access Protection More finely grained DAC Individual accountability through login procedures Audit trails Object reuse Resource isolation An example of such as system is HP-UX
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.