Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Information Security Study Set 1
Quiz 3: Governance and Strategic Planning for Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
Which model of SecSDLC does the work product from each phase fall into the next phase to serve as its starting point?
Question 22
Short Answer
The impetus to begin an SDLC-based project may be ____________________,that is,a response to some activity in the business community,inside the organization,or within the ranks of employees,customers,or other stakeholders.
Question 23
Multiple Choice
An example of a stakeholder of a company includes all of the followingexcept:​
Question 24
Multiple Choice
A project manager who understands project management,personnel management,and InfoSec technical requirements is needed to fill the role of a(n) ____________.
Question 25
Multiple Choice
The process of identifying and documenting specific and provable flaws in the organization's information asset environment is known as ____________.
Question 26
Multiple Choice
Which of these is a systems development approach that incorporates teams ofrepresentatives from multiple constituencies,including users,management,and IT,each with avested interest in the project's success?
Question 27
Multiple Choice
A senior executive who promotes the project and ensures its support,both financially and administratively,at the highest levels of the organization is needed to fill the role of a(n) ____________ on a development team.
Question 28
Multiple Choice
The individual responsible for the assessment,management,and implementation of information-protection activities in the organization is known as a(n) ____________.
Question 29
Multiple Choice
ISO 27014:2013 is the ISO 27000 series standard for ____________.
Question 30
Multiple Choice
What is the first phase of the SecSDLC?
Question 31
Multiple Choice
An information security professional with authorization to attempt to gain system access in an effort to identify and recommend resolutions for vulnerabilities in those systems is known as a(n) ____________.