Answer the following questions
Question 1: Can a user cleared for have access to documents classified in each of the following ways under the military security model?
Yes/No
_________
_________
__________________
________________
__________________
__________________
Question 2: Alan and Beatrice are both users of PKI. Explain how they use their keys to communicate when Alan sends a private message to Beatrice, and provides proof that he sent the message. List your answer in steps:
Question 3 Compare and contrast Mandatory Access Control and Discretionary Access Control. How well are they supported in various well-known (common) operating systems?