CIS 502 Course Great Wisdom / tutorialrank.com CIS 502 Course Great Wisdom / tutorialrank.com | Page 10
permission settings for the user, and then makes a decision
whether the user may access the object. The access control
model that most closely resembles this is:
•
39
The TCSEC system evaluation criteria is used to
evaluate systems of what type:
•
40
A source code review uncovered the existence of
instructions that permit the user to bypass security controls.
What was discovered in the code review?
•
41
A hidden means of communication between two
systems has been discovered. This is known as: