The PRIMARY reason for involving information security at each stage in the systems development life cycle (SDL
The PRIMARY reason for involving information security at each stage in the systems development
life cycle (SDLC) is to identify the security implications and potential solutions required for:
When defining a service level agreement (SLA) regarding the level of data confidentiality that is handled by a
When defining a service level agreement (SLA) regarding the level of data confidentiality that is
handled by a third-party service provider, the BEST indicator of compliance would be the:
Which of the following is a prevalent risk in the development of end-user computing (EUC) applications?
Which of the following is a prevalent risk in the development of end-user computing (EUC)
applications?
Which of the following would an information security manager BEST test for the existence of back doors?
A third party was engaged to develop a business application. Which of the following would an
information security manager BEST test for the existence of back doors?
which of the following stakeholders in the initiation stage of a project?
Normally, it would be essential to involve which of the following stakeholders in the initiation stage
of a project?
An information security manager reviewing firewall rules will be MOST concerned if the firewall allows:
An information security manager reviewing firewall rules will be MOST concerned if the firewall
allows:
The MAJOR advantage of a component-based development approach is the:
The MAJOR advantage of a component-based development approach is the:
What is the MOS T cost-effective means of improving security awareness of staff personnel?
What is the MOS T cost-effective means of improving security awareness of staff personnel?
The specific advantage of white box testing is that it:
The specific advantage of white box testing is that it:
Which of the following is the MOST effective at preventing an unauthorized individual from following an author
Which of the following is the MOST effective at preventing an unauthorized individual from
following an authorized person through a secured entrance (tailgating or piggybacking)?