The Orange Book is used to evaluate the security level of which of the following?
a. Entire networks
b. VPNs
c. Operating systems
d. Backups
ANS: C
Computer Science & Information Technology
You might also like to view...
The root element of the _______ document becomes the top element declaration in the schema.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The term ____________________ is applied to a software product that manages the creation, modification, and deletion of database objects such as databases instances and users.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology