What Distributed Computing Environment (DCE) component provides a mechanism to ensure that services are made a
What Distributed Computing Environment (DCE) component provides a mechanism to ensure that
services are made available only to properly designated parties?
What can be accomplished by storing on each subject a list of rights the subject has for every object?
What can be accomplished by storing on each subject a list of rights the subject has for every
object?
what relates two versions of the same object?
In the Information Flow Model, what relates two versions of the same object?
What is a security requirement that is unique to Compartmented Mode Workstations (CMW)?
What is a security requirement that is unique to Compartmented Mode Workstations (CMW)?
which distinct categories?
The Common Criteria (CC) represents requirements for IT security of a product or system under
which distinct categories?
What are the assurance designators used in the Common Criteria (CC)?
What are the assurance designators used in the Common Criteria (CC)?
Which of the following uses protection profiles and security targets?
Which of the following uses protection profiles and security targets?
what can be described as an intermediate combination of security requirement components?
According to Common Criteria, what can be described as an intermediate combination of security
requirement components?
The Common Criteria construct which allows prospective consumers or developers to create standardized sets of
The Common Criteria construct which allows prospective consumers or developers to create
standardized sets of security requirements to meet there needs is
which of the following that the Orange Book did not address?
The Information Technology Security Evaluation Criteria (ITSEC) was written to address which of
the following that the Orange Book did not address?