The _________ model is aimed at commercial rather than military applications and closely models real commercial operations.
What will be an ideal response?
Question 2
The _________ model is intended to deal with the case in which there is data that must be visible to users at multiple or all security levels but should only be modified in controlled ways by authorized agents.
What will be an ideal response?