
Information Assurance in System Development and Acquisition
Authored by MARK GALVAN
Computers
12th Grade
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is an emerging trend in software engineering regarding information assurance?
Ignoring information assurance in system development
Consideration of information assurance requirements during system design and development
Postponing information assurance until the implementation phase
Outsourcing information assurance activities
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
When should secure design be integrated into system development?
During the disposal phase
After the implementation phase
At the beginning and throughout all stages of system development
Only during the initiation phase
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Why are countermeasures most effective when planned from the initial planning phase?
They are cheaper to implement
They prevent all security breaches
They are easier to manage
They can be integrated seamlessly into the system
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is a benefit of integrating information assurance into system development methods from the start?
It reduces the need for security audits
It prevents any disruptions to current operations
It eliminates the need for security controls
It increases the need for operation
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What should be updated regularly throughout the use of a system?
System requirements
User manuals
System security plan
Hardware components
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
In which phase of the System Development Life Cycle (SDLC) is the need for a system established?
Acquisition/Development
Operation/Maintenance
Implementation
Initiation
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is done during the Security Categorization phase?
Risk assessment
Determining system functionality
Identifying information categories
Implementing security controls
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?