SSDLC

SSDLC

Professional Development

•

28 Qs

quiz-placeholder

Similar activities

Quiz - I

Quiz - I

University - Professional Development

•

25 Qs

Parts of a Computer #2 - Cables and Ports

Parts of a Computer #2 - Cables and Ports

6th Grade - Professional Development

•

25 Qs

minecraft

minecraft

KG - Professional Development

•

24 Qs

computer science

computer science

KG - Professional Development

•

23 Qs

Chapter 7 Quiz

Chapter 7 Quiz

Professional Development

•

23 Qs

BTEC Coding & Logic

BTEC Coding & Logic

12th Grade - Professional Development

•

24 Qs

Linux Test Prep 1

Linux Test Prep 1

7th Grade - Professional Development

•

25 Qs

A+ - 14B - Troubleshoot Windows Networking

A+ - 14B - Troubleshoot Windows Networking

Professional Development

•

24 Qs

SSDLC

SSDLC

Assessment

Quiz

•

Computers

•

Professional Development

•

Practice Problem

•

Hard

Created by

Amr Essam

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Phase 1:
Requirement Analysis and Definition Phase

Continue...

Don't Click!

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of threat modeling in the Requirements phase?

To speed up development

To identify potential security threats and vulnerabilities

To design the user interface

To write code

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key output of a Risk Assessment?

A list of functional requirements

A prioritized list of security risks

A user interface mockup

A project timeline

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Security Requirements Gathering?

To define specific security measures aligned with project goals

To write code faster

To design the database schema

To create a project timeline

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to document security requirements early in the SDLC?

To delay the project timeline

To reduce the cost of fixing vulnerabilities later

To ignore potential threats

To focus only on functional requirements

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a Security Requirements Traceability Matrix (SRTM)?

To track the progress of development

To map security requirements to specific risks

To design the user interface

To write test cases

Answer explanation

It ensures that all security requirements are identified and investigated. Each row of the matrix identifies a specific requirement and provides the details of how it was tested or analyzed and the results.

7.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Phase 2:
Design Phase

Continue ...

Don't Click!

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?