Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

A. A grouping of components that all have similar functions. B. A grouping of co

ID: 3544245 • Letter: A

Question

A. A grouping of components that all have similar functions.
B. A grouping of components that need to be protected from malicious hackers.
   C. A grouping of trusted components. Messages sent within a trusted group are assumed to be correct and do not need extra processing.
D. A grouping of trusted architectural components. Any messages passing across a trust boundary may need extra checks or measures. A. A grouping of components that all have similar functions.
B. A grouping of components that need to be protected from malicious hackers.
   C. A grouping of trusted components. Messages sent within a trusted group are assumed to be correct and do not need extra processing.
D. A grouping of trusted architectural components. Any messages passing across a trust boundary may need extra checks or measures.

Explanation / Answer

Both C and D

Reference:

C: "The term refers to any distinct boundary within which a system trusts all sub-systems (including data)."

D:" An example of an execution trust boundary would be where an application attains an increased privilege level (such as root)." for which we need extra measures.

in http://en.wikipedia.org/wiki/Trust_boundary

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote