Filters
Question type

During the __________ phase, specific technologies are selected to support the alternatives identified and evaluated in the prior phases.


A) investigation
B) implementation
C) analysis
D) physical design

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

____________________ enables authorized users-people or computer systems-to access information without interference or obstruction and to receive it in the required format.

Correct Answer

verifed

verified

List and describe the phases of the traditional systems development life cycle.

Correct Answer

verifed

verified

Investigation
The investigation phase be...

View Answer

Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) ​_________.

Correct Answer

verifed

verified

In the physical design phase, specific technologies are selected.

A) True
B) False

Correct Answer

verifed

verified

E-mail spoofing involves sending an e-mail message with a harmful attachment.

A) True
B) False

Correct Answer

verifed

verified

The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).

A) True
B) False

Correct Answer

verifed

verified

Information has ____________________ when it is whole, complete, and uncorrupted.

Correct Answer

verifed

verified

SecOps focuses on integrating the need for the development team to provide iterative and rapid improvements to system functionality and the need for the operations team to improve security and minimize the disruption from software release cycles. _________________________

A) True
B) False

Correct Answer

verifed

verified

Using a methodology will usually have no effect on the probability of success.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is a valid type of role when it comes to data ownership?


A) Data owners
B) Data custodians
C) Data users
D) All of the above

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

People with the primary responsibility for administering the systems that house the information used by the organization perform the role of ____.


A) Security policy developers
B) Security professionals
C) System administrators
D) End users

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

__________ has become a widely accepted evaluation standard for training and education related to the security of information systems.


A) NIST SP 800-12
B) NSTISSI No.4011
C) IEEE 802.11(g)
D) ISO 17788

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

A(n) project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas. _________________________

A) True
B) False

Correct Answer

verifed

verified

An emerging methodology to integrate the effort of the development team and the operations team to improve the functionality and security of applications is known as __________.


A) SDLC
B) DevOps
C) JAD/RAD
D) SecOps

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures, and processes, dictate the goals and expected outcomes, and determine accountability for each required action.

Correct Answer

verifed

verified

Confidentiality ensures that only those with the rights and privileges to access information are able to do so. _________________________

A) True
B) False

Correct Answer

verifed

verified

Network security focuses on the protection of physical items, objects, or areas from unauthorized access and misuse.

A) True
B) False

Correct Answer

verifed

verified

Of the two approaches to information security implementation, the top-down approach has a higher probability of success. _________________________

A) True
B) False

Correct Answer

verifed

verified

The Analysis phase of the SDLC examines the event or plan that initiates the process and specifies the objectives, constraints, and scope of the project. _________________________

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 87

Related Exams

Show Answer