Exam 10: Information Systems Acquisition, Development, and Maintenance
Exam 1: Understanding Cybersecurity Policy and Governance20 Questions
Exam 2: Cybersecurity Policy Organization, Format, and Styles20 Questions
Exam 3: Cybersecurity Framework20 Questions
Exam 4: Governance and Risk Management20 Questions
Exam 5: Asset Management and Data Loss Prevention19 Questions
Exam 6: Human Resources Security20 Questions
Exam 7: Physical and Environmental Security19 Questions
Exam 8: Communications and Operations Security19 Questions
Exam 9: Access Control Management18 Questions
Exam 10: Information Systems Acquisition, Development, and Maintenance20 Questions
Exam 11: Cybersecurity Incident Response20 Questions
Exam 12: Business Continuity Management20 Questions
Exam 13: Regulatory Compliance for Financial Institutions20 Questions
Exam 14: Regulatory Compliance for the Health-Care Sector20 Questions
Exam 15: PCI Compliance for Merchants20 Questions
Exam 16: Nist Cybersecurity Framework20 Questions
Select questions type
Which of the following is a component of PKI?
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
D
Which of the following is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted?
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
D
Identification of compliance requirements is done during which of the following phases of the SDLC?
Free
(Multiple Choice)
4.8/5
(45)
Correct Answer:
A
Which of the following is the most common web application security flaw?
(Multiple Choice)
4.9/5
(40)
Which of the following is used to associate a public key with an identity?
(Multiple Choice)
5.0/5
(39)
In which phase of the SDLC are systems and products in place and operating, enhancements and/or modifications to the system are being developed and tested, and hardware and software components are added or replaced?
(Multiple Choice)
4.9/5
(43)
Which of the following is an open framework to help organizations formulate and implement a strategy for software security that is tailored to the specific risks facing the organization?
(Multiple Choice)
4.9/5
(38)
Which of the following provides a standardized process for all phases of any system development or acquisition effort?
(Multiple Choice)
4.9/5
(33)
Which of the following is a hybrid of a beta and a final release version of a software product?
(Multiple Choice)
4.9/5
(42)
Which of the following is one of the most popular symmetric algorithms of recent years?
(Multiple Choice)
4.9/5
(33)
Which of the following is not a best practice for cryptographic key management?
(Multiple Choice)
4.8/5
(40)
Which of the following statements about asymmetric key cryptography is true?
(Multiple Choice)
4.9/5
(31)
Which of the following tasks is part of the disposal phase of the SDLC?
(Multiple Choice)
4.9/5
(33)
Which of the following statements about symmetric key cryptography is not true?
(Multiple Choice)
4.8/5
(41)
Which of the following components of PKI performs the administrative functions, including verifying the identity of users and organizations requesting a digital certificate?
(Multiple Choice)
4.8/5
(38)
Which of the following is the process of creating a numeric value that represents the original text?
(Multiple Choice)
4.7/5
(36)
Which of the following issues and maintains digital certificates?
(Multiple Choice)
4.9/5
(39)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)