Question: Which of the following can be described as the process of creating two versions of an object so that users at a lower level of security cannot access information at a higher level of sensitivity?
A. Polymorphism
B. Polyinstantiation
C. Inference
D. Aggregation

Download pdf (with explanations) edition of this exam.