Question: The trusted computing base controls which of the following?
A. All trusted processes and software components
B. All trusted security policies and implementation mechanisms
C. All trusted software and design mechanisms
D. All trusted software and hardware components

Download pdf (with explanations) edition of this exam.