Saturday, 17 December 2011

4. ______ protects system resources from unauthorized calls?


A. Role-based security
 B. Code-based security
Ans:B