Sample questions

Q1. Which one of the following activities is performed during the development/implementation phase of the system development life cycle?

  1. Performing security testing on particular parts of the system that are developed or acquired
  2. Auditing
  3. Sensitive assessment
  4. Monitoring

Q2. Information leakage-related issues can be addressed through:

  1. Circumvent analysis
  2. Information channel assessment
  3. Covert channel analysis
  4. Channel security process

Q3. Which of the following software development models is an iterative model? (This is a drag-and-drop type of question. Here, you can draw a line from the list of answers on the left to the empty box on the right).

Sample questions

Q4. Validation is used to:

  1. Establish the adherence to software specifications
  2. Fitness to the system as per the design and requirements
  3. Monitor code review timelines
  4. Design user interfaces

Q5. The following list provides various phases of system security life cycle except:

  1. Integration phase
  2. Initiation phase
  3. Implementation phase
  4. Disposal phase

Q6. At what phase of system development life cycle should the sensitive assessment be conducted?

  1. Acquisition phase
  2. Initiation phase
  3. Disposal phase
  4. Operation phase

Q7. Patch management is a systematic way of applying the patches to the applications. Identify appropriate action while applying patches from the following:

Sample questions

Q8. Which one of the following software development life cycle frameworks emphasize the iteration throughout the development life cycle?

  1. The Agile framework
  2. The Spiral model
  3. The Incremental model
  4. The Waterfall model
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.17.76.175