s use different physical objects like separate printers ii) cryptographic separation – in which process having different security requirement at different times iii) Logical separation – In which users operate under illusion that no other processes exist iv) cryptographic separation – In which processes conceal their data and computations
1. i
2.i and ii
3. ii and iii
4. iii and iv
Posted Date:-2022-03-30 14:23:11