Exam 10: Information Systems Acquisition, Development, and Maintenance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is a component of PKI?

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

D

Which of the following is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted?

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

D

Identification of compliance requirements is done during which of the following phases of the SDLC?

Free
(Multiple Choice)
4.8/5
(45)
Correct Answer:
Verified

A

Symmetric key cryptography uses which of the following?

(Multiple Choice)
4.8/5
(40)

Which of the following provides confidentiality?

(Multiple Choice)
4.9/5
(35)

Public key cryptography uses which of the following?

(Multiple Choice)
4.8/5
(38)

Which of the following is the most common web application security flaw?

(Multiple Choice)
4.9/5
(40)

Which of the following is used to associate a public key with an identity?

(Multiple Choice)
5.0/5
(39)

In which phase of the SDLC are systems and products in place and operating, enhancements and/or modifications to the system are being developed and tested, and hardware and software components are added or replaced?

(Multiple Choice)
4.9/5
(43)

Which of the following is an open framework to help organizations formulate and implement a strategy for software security that is tailored to the specific risks facing the organization?

(Multiple Choice)
4.9/5
(38)

Which of the following provides a standardized process for all phases of any system development or acquisition effort?

(Multiple Choice)
4.9/5
(33)

Which of the following is a hybrid of a beta and a final release version of a software product?

(Multiple Choice)
4.9/5
(42)

Which of the following is one of the most popular symmetric algorithms of recent years?

(Multiple Choice)
4.9/5
(33)

Which of the following is not a best practice for cryptographic key management?

(Multiple Choice)
4.8/5
(40)

Which of the following statements about asymmetric key cryptography is true?

(Multiple Choice)
4.9/5
(31)

Which of the following tasks is part of the disposal phase of the SDLC?

(Multiple Choice)
4.9/5
(33)

Which of the following statements about symmetric key cryptography is not true?

(Multiple Choice)
4.8/5
(41)

Which of the following components of PKI performs the administrative functions, including verifying the identity of users and organizations requesting a digital certificate?

(Multiple Choice)
4.8/5
(38)

Which of the following is the process of creating a numeric value that represents the original text?

(Multiple Choice)
4.7/5
(36)

Which of the following issues and maintains digital certificates?

(Multiple Choice)
4.9/5
(39)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)