A breach at a government agency resulted in the public release of top secret information. The Chief Information Security Officer has tasked a group of security professionals to deploy a system which will protect against such breaches in the future.
Which of the following can the government agency deploy to meet future security needs?
A . A DAC which enforces no read-up, a DAC which enforces no write-down, and a MAC which uses an access matrix.
B . A MAC which enforces no write-up, a MAC which enforces no read-down, and a DAC which uses an AC
D . A MAC which enforces no read-up, a MAC which enforces no write-down, and a DAC which uses an access matrix.
E . A DAC which enforces no write-up, a DAC which enforces no read-down, and a MAC which uses an AC
Answer: C
Leave a Reply