1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wlad13 [49]
4 years ago
12

Under the common criteria, which term describes the user-generated specifications for security requirements?

Computers and Technology
1 answer:
Irina-Kira [14]4 years ago
6 0

The correct answer to this question is the:

“Protection Profile (PP)”

<span>According to the ISO/IEC 15408 and the Common Criteria (CC), the Protection Profile (PP) is a document used as a part of the certification process. And since it is a generic form of a Security Target (ST), this makes it a typical creation by a user or a community of users.</span>

You might be interested in
Why is an array like a list? How do you identify and find elements in an array? Explain the purpose of a try-catch block and giv
viktelen [127]

Answer:

Java supports creation and manipulation of arrays, as a data structure. The index of an array is an integer value that has value in interval [0, n-1], where n is the size of the array. If a request for a negative or an index greater than or equal to size of array is made, then the JAVA throws a ArrayIndexOutOfBounds Exception. This is unlike C/C++ where no index of bound check is done.

The ArrayIndexOutOfBoundsException is a Runtime Exception thrown only at runtime. The Java Compiler does not check for this error during the compilation of a program.

Explanation:

8 0
4 years ago
Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the inte
coldgirl [10]

Answer: Network access control (NAC)

Explanation:

The solution that should be used is the network access control. Network access control helps in keeping devices and users that are unauthorized out of ones private network.

In this case, since one will like to prevent the laptops from connecting to the network unless anti-virus software and the latest operating system patches are installed, then the network access control can be used. One can only give access to the device that it wants to give access to and prevent others from connecting.

3 0
3 years ago
Mathematics and computer science share many concepts.
Nastasia [14]

Answer:

Recursion

Explanation:

7 0
3 years ago
Read 2 more answers
List the steps to create a new folder in windows
Oksanka [162]

Navigate to where you want to create the new folder, and click New Folder. Type the name of your folder, and press Enter. To save a document to the new folder, open the document, and click File > Save As, and then browse to the new folder, and click Save.

8 0
3 years ago
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
kolbaska11 [484]
The answer would be a network

7 0
3 years ago
Other questions:
  • __________ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter.
    15·1 answer
  • URLs are directions that browsers follow in order to find specific web page files. What is the first part of the URL that is the
    14·1 answer
  • To use an ArrayList in your program, you must import:1. the java.collections package2. the java.awt package3. Nothing; the class
    6·1 answer
  • Suppose a computer has 1GB of memory. Operating System takes 256 MB of memory. Imagine each task takes up 196 MB of memory and t
    12·1 answer
  • There is a company of name "Baga" and it produces differenty kinds of mobiles. Below is the list of model name of the moble and
    7·1 answer
  • Of all excavation hazards, _______ poses the greatest risk
    8·1 answer
  • Theresa is not sure how nondestructive editing can be helpful in her project. Which of these is accurate about nondestructive ed
    8·1 answer
  • How does the Evaluate Formula dialog box help fix errors?
    9·2 answers
  • The conversion rate is the percentage of what? A. Customers who received cold calls B. Sales leads who reached the interest stag
    13·1 answer
  • What are the common operations performed on character strings?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!