The Orange Book is used to evaluate the security level of which of the following?

a. Entire networks
b. VPNs
c. Operating systems
d. Backups

ANS: C

Computer Science & Information Technology

You might also like to view...

The root element of the _______ document becomes the top element declaration in the schema.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The term ____________________ is applied to a software product that manages the creation, modification, and deletion of database objects such as databases instances and users.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology