SSDLC

SSDLC

Professional Development

28 Qs

quiz-placeholder

Similar activities

Computing Test

Computing Test

KG - Professional Development

23 Qs

SQL Exam

SQL Exam

Professional Development

23 Qs

UTK - Interfejsy, urządzenia wskazujące

UTK - Interfejsy, urządzenia wskazujące

Professional Development

25 Qs

tin học

tin học

Professional Development

24 Qs

safety in ict

safety in ict

Professional Development

23 Qs

PKM Power Point

PKM Power Point

Professional Development

23 Qs

IT support level-1 (MCQ-1)

IT support level-1 (MCQ-1)

Professional Development

25 Qs

JS QUİZ

JS QUİZ

Professional Development

23 Qs

SSDLC

SSDLC

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Amr Essam

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Phase 1:
Requirement Analysis and Definition Phase

Continue...

Don't Click!

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of threat modeling in the Requirements phase?

To speed up development

To identify potential security threats and vulnerabilities

To design the user interface

To write code

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key output of a Risk Assessment?

A list of functional requirements

A prioritized list of security risks

A user interface mockup

A project timeline

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Security Requirements Gathering?

To define specific security measures aligned with project goals

To write code faster

To design the database schema

To create a project timeline

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to document security requirements early in the SDLC?

To delay the project timeline

To reduce the cost of fixing vulnerabilities later

To ignore potential threats

To focus only on functional requirements

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a Security Requirements Traceability Matrix (SRTM)?

To track the progress of development

To map security requirements to specific risks

To design the user interface

To write test cases

Answer explanation

It ensures that all security requirements are identified and investigated. Each row of the matrix identifies a specific requirement and provides the details of how it was tested or analyzed and the results.

7.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Phase 2:
Design Phase

Continue ...

Don't Click!

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?