CIS 502 Course Great Wisdom / tutorialrank.com CIS 502 Course Great Wisdom / tutorialrank.com | Page 10

permission settings for the user, and then makes a decision whether the user may access the object. The access control model that most closely resembles this is: • 39 The TCSEC system evaluation criteria is used to evaluate systems of what type: • 40 A source code review uncovered the existence of instructions that permit the user to bypass security controls. What was discovered in the code review? • 41 A hidden means of communication between two systems has been discovered. This is known as: