ISO 15408 Standard

Çıkış

Soru 1 of 1

  Kalan Zaman


0 [{"id":46817,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:25:12","updated_at":"2016-03-20 14:49:32","questionName":"Describe the countermeasure(s) for which correctness will be determined in the evaluation","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46845,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:40:34","updated_at":"2016-03-20 14:49:32","questionName":"The correctness of the TOE is determined.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":17,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46808,"quiz_id":"3788","answer_id":null,"answerType_id":"2","created_at":"2016-03-20 14:19:10","updated_at":"2016-03-20 14:49:32","questionName":"Create the sentence for the safeguarding of assets model.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46810,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:21:50","updated_at":"2016-03-20 14:49:32","questionName":"In an evaluation, the countermeasures is analysed through a construct called the Security Target.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46842,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:39:49","updated_at":"2016-03-20 14:49:32","questionName":"The sufficiency of the TOE and the operational environment are determined;","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":16,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46847,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:41:23","updated_at":"2016-03-20 14:49:32","questionName":"Carried out by applying the Security Target evaluation criteria (which are defined in ISO\/IEC 15408-3) to the Security Target.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":18,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46820,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:26:49","updated_at":"2016-03-20 14:49:32","questionName":"Describe the countermeasures for which correctness will not be determined in the evaluation.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46826,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:30:42","updated_at":"2016-03-20 14:49:32","questionName":"What is always in the Operational Environment and considered a non-IT countermeasure?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46857,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:47:43","updated_at":"2016-03-20 14:49:32","questionName":"Intended to describe a TOE type (e.g. firewalls).","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":21,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46815,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:23:51","updated_at":"2016-03-20 14:49:32","questionName":"Implementation-dependent statement of security needs for a specific identified TOE","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46838,"quiz_id":"3788","answer_id":null,"answerType_id":"3","created_at":"2016-03-20 14:37:42","updated_at":"2016-03-20 14:49:32","questionName":"Organize the evaluation of countermeasures from the Security Targets perspective","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":15,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46850,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:42:15","updated_at":"2016-03-20 14:49:32","questionName":"Consists of applying the SARs (from the Security Target) to the evaluation evidence.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":19,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46856,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:46:01","updated_at":"2016-03-20 14:49:32","questionName":"A named set of security requirements that are either functional or assurance","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":20,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46809,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:19:49","updated_at":"2016-03-20 14:49:32","questionName":"Safeguarding assets of interest is the responsibility of...","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
46817
0
120
block

Describe the countermeasure(s) for which correctness will be determined in the evaluation

Doğru Cevapları Seç  

(0/0)












46845
0
120
none
46808
0
120
none
46810
0
120
none
46842
0
120
none
46847
0
120
none
46820
0
120
none
46826
0
120
none
46857
0
120
none
46815
0
120
none
46838
0
120
none
46850
0
120
none
46856
0
120
none
46809
0
120
none