A. A grouping of components that all have similar functions. B. A grouping of co
ID: 3544245 • Letter: A
Question
A. A grouping of components that all have similar functions.B. A grouping of components that need to be protected from malicious hackers.
C. A grouping of trusted components. Messages sent within a trusted group are assumed to be correct and do not need extra processing.
D. A grouping of trusted architectural components. Any messages passing across a trust boundary may need extra checks or measures. A. A grouping of components that all have similar functions.
B. A grouping of components that need to be protected from malicious hackers.
C. A grouping of trusted components. Messages sent within a trusted group are assumed to be correct and do not need extra processing.
D. A grouping of trusted architectural components. Any messages passing across a trust boundary may need extra checks or measures.
Explanation / Answer
Both C and D
Reference:
C: "The term refers to any distinct boundary within which a system trusts all sub-systems (including data)."
D:" An example of an execution trust boundary would be where an application attains an increased privilege level (such as root)." for which we need extra measures.