Which of the principles does having an all-powerful system administration account violate? Pick the best one.
Which of the following reflects the principle of complete mediation?
Which of the following underlie software security design principles?
Which of the following underlie software security design principles?
A virtual machine isolates its operating system and processes from the host it runs on. Which principle best reflects this?
Considering the basic file access controls of Windows and Linux systems (called "systems" here), which of the following is true?
To change to the root user, the su(1) program in FreeBSD requires that the user know the root password and that the user be a member of group 0. Which principle does this reflect? Pick the best one.