Answer:
"Option a, c, and d" is the correct answer to this question.
Step-by-step explanation:
It is a safety model, that blocks or restricts unauthorized programs in aspects that negatively impact data. It monitors the applications by providing verification, identification, entry, etc.
- This model provides technical monitoring and ensures completeness and validity, in this question except for option b all were correct so, the wrong option can be described as follows:
- In option b, It is wrong because in this model server access is not restricted.