The framework for evaluating a system against a set of security requirements that supersedes TCSEC and ITSEC is:

a. The Orange Book
b. The CMMI
c. The Common Criteria
d. COBIT


c. The Common Criteria

Computer Science & Information Technology

You might also like to view...

With what value should the accumulator variable be initialized to calculate the total of all values in a numeric array?

a. null b. false c. 0 d. ?1

Computer Science & Information Technology

In a splay tree, how is the rank of a node stored?

a. an extra array stores the information b. a linked list stores the information c. directly, in each node d. indirectly, by storing the size in each node e. the rank is not stored at all

Computer Science & Information Technology

Which of the following represents how the address block field displays in a mail document of a mail merge?

A) «AddressBlock» B) {AddressBlock} C) [AddressBlock] D) AddressBlock

Computer Science & Information Technology

Which program flow charting symbol is used to indicate a choice between two alternative paths?

a) process b) general input/output c) terminal interrupt d) decision

Computer Science & Information Technology