Information Technology Software Development
Information Technology Software Development Questions
Quiz Questions Part 1: True/False – Multiple Choice answers (4 Points Each)
1. What are the 3 main principle concepts of Information Assurance? a. b. c. d.
Confidentiality, Integrity, Availability
Integrity, Risk, Breaches
Security Policies, Qualitative Analysis, Availability
Vulnerabilities, Malware, Confidentiality
Answer: ____
2. True or False
Business proposal plan (BPP) is used to maintain the continuous operation of a business in the event of an emergency situation.
Answer: ____
3. True or False
EAL 8 the EAL where a system or product is Formally verified, designed and tested.
Answer: ____
4. True or False
When conducting risk assessments, an example of an adverse impact is the inability to perform current business functions.
Answer: ____
5. True or False
The severity of vulnerabilities is context dependent.
Answer: ____
6. Thread shifting can occur in one of more of these domains except for. a. b. c. d.
Target domain
Resource domain
Space domain
Time domain
Answer: ____
7. True or False
NIST risk management process includes these steps: Access, Frame, Monitor, Respond.
Answer: ____
8. True or False
FIPS 200 is a guideline to meet minimum security requirements for federal information and information systems. There are 17 areas and one of those areas is Media destruction.
Answer: ____
9. True or False
A Security Policy also includes the security implementation.
Answer: ____
10. True or False
Bell-LaPadula Security model has two major limitations. 1. It addresses Integrity and 2. There is no method for management of classifications.
Answer: ____
Part 2: Short Answers (20 points each). Please answer briefly and completely and cite all sources of information. Please restrict your answer for each question to one (1) page (double spaced) or less.
1. Briefly explain security policy, standards, Procedures, and Guidelines and how would you use them.
2. Briefly describe the different security architecture models or frameworks.
3. Briefly describe what is an attack, threat, vulnerability and controls (countermeasures) and provide an example of each.

Having Trouble Meeting Your Deadline?
Get your assignment on Information Technology Software Development completed on time. avoid delay and – ORDER NOW