Question: Which of the following best describes the security kernel?
A. A software component that monitors activity and writes security events to an audit log
B. A software component that determines whether a user is authorized to perform a requested operation
C. A software component that isolates processes and separates privileged and user modes
D. A software component that works in the center protection ring and provides interfaces between trusted and untrusted objects

Download pdf (with explanations) edition of this exam.