Multiple Choice
During the deployment of a new system, the implementation team determines that APIs used to integrate the new system with a legacy system are not functioning properly. Further investigation shows there is a misconfigured encryption algorithm used to secure data transfers between systems. Which of the following should the project manager use to determine the source of the defined algorithm in use?
A) Code repositories
B) Security requirements traceability matrix
C) Software development lifecycle
D) Data design diagram
E) Roles matrix
F) Implementation guide
Correct Answer:

Verified
Correct Answer:
Verified
Q172: A Chief Information Security Officer (CISO) is
Q173: A government contractor was the victim of
Q174: A systems analyst is concerned that the
Q175: A hospital's security team recently determined its
Q176: Company.org has requested a black-box security assessment
Q178: A company has made it a spending
Q179: An organization is moving internal core data-processing
Q180: A company is not familiar with the
Q181: Ann, a retiring employee, cleaned out her
Q182: A Chief Information Security Officer (CISO) is