Information Technology Software Development

Question

Dot Image

Information Technology Software Development Questions

Quiz Questions Part 1: True/False – Multiple Choice answers (4 Points Each)

1. What are the 3 main principle concepts of Information Assurance? a. b. c. d.

Confidentiality, Integrity, Availability

Integrity, Risk, Breaches

Security Policies, Qualitative Analysis, Availability

Vulnerabilities, Malware, Confidentiality

Answer: ____

2. True or False

Business proposal plan (BPP) is used to maintain the continuous operation of a business in the event of an emergency situation.

Answer: ____

3. True or False

 EAL 8 the EAL where a system or product is Formally verified, designed and tested.

Answer: ____

4. True or False

When conducting risk assessments, an example of an adverse impact is the inability to perform current business functions.

Answer: ____

5. True or False

The severity of vulnerabilities is context dependent.

Answer: ____

6. Thread shifting can occur in one of more of these domains except for. a. b. c. d.

Target domain

Resource domain

Space domain

 Time domain

Answer: ____

7. True or False

NIST risk management process includes these steps: Access, Frame, Monitor, Respond.

Answer: ____

8. True or False

 FIPS 200 is a guideline to meet minimum security requirements for federal information and information systems. There are 17 areas and one of those areas is Media destruction.

Answer: ____

9. True or False

A Security Policy also includes the security implementation.

Answer: ____

10. True or False

Bell-LaPadula Security model has two major limitations. 1. It addresses Integrity and 2. There is no method for management of classifications.

Answer: ____

 Part 2: Short Answers (20 points each). Please answer briefly and completely and cite all sources of information. Please restrict your answer for each question to one (1) page (double spaced) or less.

 1. Briefly explain security policy, standards, Procedures, and Guidelines and how would you use them.

2. Briefly describe the different security architecture models or frameworks.

3. Briefly describe what is an attack, threat, vulnerability and controls (countermeasures) and provide an example of each.

Having Trouble Meeting Your Deadline?

Get your assignment on Information Technology Software Development completed on time. avoid delay and – ORDER NOW

Dot Image

Order Solution Now

Similar Posts