Exam 5: Software Requirements: Hear What They Say, Know What They Mean, Protect What They Own

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When requirements begin to creep in from all angles without any further analysis, this is called scope creep.

(True/False)
4.8/5
(38)

Descriptive words make the misuse more complicated and chaotic.

(True/False)
4.9/5
(39)

Why are developers concerned with application assets?

(Multiple Choice)
4.8/5
(40)

The honest, open-ended approach is too vague of an approach to begin the communication process.

(True/False)
4.7/5
(40)

There should be a dependent relationship between the developer and analyst that ensures that both individuals have done their jobs.

(True/False)
4.8/5
(33)

Misuse cases are similar to use cases only they are the opposite.

(True/False)
4.7/5
(39)

The needs statement provides the main mission or purpose of the application.

(True/False)
4.9/5
(43)

Why is it important to know your enemies in an attack?

(Multiple Choice)
4.9/5
(30)

Visualization is very powerful and it will certainly help your overall understanding of the requirements.

(True/False)
4.8/5
(35)

Only the project manager has the responsibility of identifying assets.

(True/False)
4.9/5
(35)

What do interaction diagrams do for requirements?

(Multiple Choice)
4.8/5
(33)

Knowing the enemy preconditions will help the management team determine if the cost of developing countermeasures overrides the risk of taking a chance.

(True/False)
4.8/5
(32)

What do preconditions define in a misuse case?

(Multiple Choice)
4.8/5
(28)

The relationship between use case documentation and its counterpart misuse case are independent of each other.

(True/False)
4.9/5
(35)

C.I.A. stands for confidentiality, integrity, and accountability.

(True/False)
4.9/5
(45)

What does 'meaningful requirements' mean?

(Multiple Choice)
4.9/5
(42)

Catching software requirements errors at the beginning of the development process is very costly.

(True/False)
4.8/5
(34)

The first step in devising a misuse case is putting a face to your enemy.

(True/False)
5.0/5
(39)

When listing attack types, don't let everyone on the team contribute options.

(True/False)
4.8/5
(36)

Who is responsible for helping in the identification of assets?

(Multiple Choice)
4.7/5
(39)
Showing 21 - 40 of 43
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)