A.IS quality assurance. IS質(zhì)量保證 B.IS resource management. IS資源管理 C.IS operations. IS操作 D.Corporate security. 企業(yè)安全
A.Auditing and controlling any changes to the Trusted Computing Base. 審計(jì)和控制對(duì)可信計(jì)算基的任何更改 B.Auditing of changes to the Trusted Computing Base. 審計(jì)可信計(jì)算基的變更 C.Control of changes to the Trusted Computing Base. 控制可信計(jì)算的變更 D.Changes in the configuration access to the Trusted Computing Base. 對(duì)可信計(jì)算基配置訪問(wèn)的變更
A. The subject's sensitivity label must dominate the object's sensitivity label.主體的敏感性標(biāo)識(shí)必須支配客體的敏感性標(biāo)識(shí) B. The subject's sensitivity label subordinates the object's sensitivity label.主體的敏感性標(biāo)識(shí)從屬于客體的敏感性標(biāo)識(shí) C. The subject's sensitivity label is subordinated by the object's sensitivity label.主體的敏感性標(biāo)識(shí)被客體的敏感性標(biāo)識(shí)從屬 D. The subject's sensitivity label is dominated by the object's sensitivity label.主體的敏感性標(biāo)識(shí)以客體的敏感性標(biāo)識(shí)為主體