The _______ is a hardware module that is at the heart of a hardware/software approach to trusted computing.
A. BLP B. TC
C. CC D. TPM
Question 2
The _________ Model was developed for commercial applications in which conflicts of interest can arise.
A. Biba B. Clark-Wilson Integrity
C. Bell-Lapadula D. Chinese Wall