Q1. Which one of the following activities is performed during the development/implementation phase of the system development life cycle?
Performing security testing on particular parts of the system that are developed or acquired
Auditing
Sensitive assessment
Monitoring
Q2. Information leakage-related issues can be addressed through:
Circumvent analysis
Information channel assessment
Covert channel analysis
Channel security process
Q3. Which of the following software development models is an iterative model? (This is a drag-and-drop type of question. Here, you can draw a line from the list of answers on the left to the empty box on the right).
Q4. Validation is used to:
Establish the adherence to software specifications
Fitness to the system as per the design and requirements
Monitor code review timelines
Design user interfaces
Q5. The following list provides various phases of system security life cycle except:
Integration phase
Initiation phase
Implementation phase
Disposal phase
Q6. At what...