A third party certification registry for software security is available under a scheme that is known as the ____.

A. Common Validation
B. Common Criteria
C. Common Certification
D. Common Controls


Answer: B

Computer Science & Information Technology

You might also like to view...

#include is an example of a(n)

A) comment. B) I/O statement. C) preprocessor directive. D) stream directive. E) compiler option.

Computer Science & Information Technology

What is the base case for the recursive merge sort algorithm?

a. Any array that is already sorted. b. A two-element array. c. A one-element array. d. A zero-element array.

Computer Science & Information Technology

What is the first step in choosing an optimal location for an access point?

A. Software upgrades B. Market research C. Site survey D. Interference control

Computer Science & Information Technology

For an array containing 2, 3, 5, 6, 9, 13, 16, and 19, what value does a recursive binary search algorithm return when it searches for 10?

a. –1 b. 0 c. 1 d. 10

Computer Science & Information Technology