What are the assurance designators used in the Common Criteria (CC)?
What are the assurance designators used in the Common Criteria (CC)?
Which of the following uses protection profiles and security targets?
Which of the following uses protection profiles and security targets?
what can be described as an intermediate combination of security requirement components?
According to Common Criteria, what can be described as an intermediate combination of security
requirement components?
The Common Criteria construct which allows prospective consumers or developers to create standardized sets of
The Common Criteria construct which allows prospective consumers or developers to create
standardized sets of security requirements to meet there needs is
which of the following that the Orange Book did not address?
The Information Technology Security Evaluation Criteria (ITSEC) was written to address which of the
following that the Orange Book did not address?
Which of the following was developed by the National Computer Security Center (NCSC)?
Which of the following was developed by the National Computer Security Center (NCSC)?
The Trusted Computer Security Evaluation Criteria (TBSEC) provides
The Trusted Computer Security Evaluation Criteria (TBSEC) provides
Which Orange Book evaluation level is described as “Verified Design”?
Which Orange Book evaluation level is described as “Verified Design”?
Which of the following classes is defined in the TCSEC (Orange Book) as mandatory protection?
Which of the following classes is defined in the TCSEC (Orange Book) as mandatory protection?
Which Orange Book security rating requires that formal techniques are used to prove the equivalence between th
Which Orange Book security rating requires that formal techniques are used to prove the
equivalence between the TCB specifications and the security policy model?