A.IS quality assurance. IS質(zhì)量保證 B.IS resource management. IS資源管理 C.IS operations. IS操作 D.Corporate security. 企業(yè)安全
A.Auditing and controlling any changes to the Trusted Computing Base. 審計和控制對可信計算基的任何更改 B.Auditing of changes to the Trusted Computing Base. 審計可信計算基的變更 C.Control of changes to the Trusted Computing Base. 控制可信計算的變更 D.Changes in the configuration access to the Trusted Computing Base. 對可信計算基配置訪問的變更
A. The subject's sensitivity label must dominate the object's sensitivity label.主體的敏感性標識必須支配客體的敏感性標識 B. The subject's sensitivity label subordinates the object's sensitivity label.主體的敏感性標識從屬于客體的敏感性標識 C. The subject's sensitivity label is subordinated by the object's sensitivity label.主體的敏感性標識被客體的敏感性標識從屬 D. The subject's sensitivity label is dominated by the object's sensitivity label.主體的敏感性標識以客體的敏感性標識為主體