During the deployment of a new system, the implementation team determines that APIs used to integrate the new system with a legacy system are not functioning properly. Further investigation shows there is a misconfigured encryption algorithm used to secure data transfers between systems. Which of the following should the project manager use to determine the source of the defined algorithm in use?
A) Code repositories
B) Security requirements traceability matrix
C) Software development lifecycle
D) Roles matrix
E) Implementation guide
Correct Answer:
Verified
Q281: After several industry competitors suffered data loss
Q282: A security manager recently categorized an information
Q283: As part of incident response, a technician
Q284: Within the past six months, a company
Q285: A project manager is working with system
Q287: A security administrator is troubleshooting RADIUS authentication
Q288: A company has decided to replace all
Q289: A company's chief cybersecurity architect wants to
Q290: An administrator has noticed mobile devices from
Q291: A newly hired Chief Information Security Officer
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents