Search Header Logo

Information Assurance and Security II Quiz

Authored by Wilfredo Jr.

Computers

12th Grade

Used 2+ times

Information Assurance and Security II Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the benefit of integrating information assurance and security into system development methods?

Improves current operations

Delays system development

Increases disruptions

Reduces costs

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What does SDLC stand for in the context of system development?

Software Development Lifecycle Cycle

System Development Life Cycle

Security Development Lifecycle

System Design and Lifecycle Control

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

How many phases are there in the System Development Life Cycle (SDLC)?

Seven

Ten

Five

Three

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What activities are involved in a SDLC?

Research, Development, Marketing, Sales, Customer Service

Initiation, Analysis, Design, Implementation, Maintenance, Disposal

Planning, Testing, Deployment, Monitoring, Evaluation

Coding, Debugging, Documentation, Training, Support

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What does SSDLC stand for in the context of Information Assurance?

Software System Design Lifecycle Control

Secure System Development Life Cycle

System Security Development Lifecycle

Security System Deployment Lifecycle

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

How should information assurance teams be involved in the system development process?

Only during the implementation phase

Only during the maintenance phase

Only during the disposal phase

During the requirements gathering phase

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What should information assurance teams develop and use during system development?

Standard information assurance enterprise architectures

Customized security services

Non-standard security protocols

Proprietary information assurance controls

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?