ISACA Exam Questions

what stage of the applications development process woul…

At what stage of the applications development process would encryption key management initially be
addressed?

A.
Requirements development

B.
Deployment

C.
Systems testing

D.
Code reviews

Explanation:

Encryption key management has to be integrated into the requirements of the application’s design. During systems testing and deployment would be too late since the requirements have already been agreed upon.
Code reviews are part of the final quality assurance (QA) process and would also be too late in the process.