SSDLC

SSDLC

Professional Development

28 Qs

quiz-placeholder

Similar activities

MACHINE LEARNING

MACHINE LEARNING

Professional Development

25 Qs

SE-II

SE-II

Professional Development

30 Qs

Day 1 Quiz - Video Editing for Educators using Premiere

Day 1 Quiz - Video Editing for Educators using Premiere

Professional Development

30 Qs

Chapter 9 Quiz

Chapter 9 Quiz

Professional Development

23 Qs

Lesson 4 Roles and Responsibilities

Lesson 4 Roles and Responsibilities

Professional Development

28 Qs

Chapter 1 - SDLC Review

Chapter 1 - SDLC Review

Professional Development

25 Qs

PDM Workshop Test

PDM Workshop Test

University - Professional Development

25 Qs

Macromedia Flash

Macromedia Flash

8th Grade - Professional Development

26 Qs

SSDLC

SSDLC

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Amr Essam

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Phase 1:
Requirement Analysis and Definition Phase

Continue...

Don't Click!

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of threat modeling in the Requirements phase?

To speed up development

To identify potential security threats and vulnerabilities

To design the user interface

To write code

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key output of a Risk Assessment?

A list of functional requirements

A prioritized list of security risks

A user interface mockup

A project timeline

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Security Requirements Gathering?

To define specific security measures aligned with project goals

To write code faster

To design the database schema

To create a project timeline

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to document security requirements early in the SDLC?

To delay the project timeline

To reduce the cost of fixing vulnerabilities later

To ignore potential threats

To focus only on functional requirements

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a Security Requirements Traceability Matrix (SRTM)?

To track the progress of development

To map security requirements to specific risks

To design the user interface

To write test cases

Answer explanation

It ensures that all security requirements are identified and investigated. Each row of the matrix identifies a specific requirement and provides the details of how it was tested or analyzed and the results.

7.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Phase 2:
Design Phase

Continue ...

Don't Click!

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?