Risk analysis is MOST useful when applied during which phase of the system development process?

iss midterm

Quiz
•
Other
•
University
•
Medium
Mạnh nguyễn
Used 5+ times
FREE Resource
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Requirements definition
Implementation planning
Project identification
System construction
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which must bear the primary responsibility for determining the level of protection needed for information systems resources?
Senior Management
Seniors security analysts
System auditors
IS security specialists
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes a covert timing channel?
Provides the timing trigger to activate a malicious program disguised as a legitimate function.
Used by a supervisor to monitor the productivity of a user without their knowledge
Allows one process to signal information to another by modulating its own use of system resources
Modulated to carry an unintended information signal that can only be detected by special, sensitive receivers.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is being considered as the most reliable kind of personal identification?
Finger print
Ticket Granting
Password
Token
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main responsibility of the information owner?
making the determination to decide what level of classification the information requires
periodically checking the validity and accuracy for all data in the information system
running regular backups
audit the users when they require access to the information
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is called the access protection system that limits connections by calling back the number of a previously authorized location?
Sendback forward systems
Callback forward systems
Sendback system
Callback systems
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is called a type of access control where a central authority determines what subjects can have access to certain objects, based on the organizational security policy?
Rule-based access control
Non-discretionary Access Control
Mandatory Access Control
Discretionary Access Control
Create a free account and access millions of resources
Similar Resources on Quizizz
55 questions
AZ-900_Azure_Architecture_and_Services_MCQs P1

Quiz
•
University
57 questions
INFO 232 / COMP 351 - CH 1

Quiz
•
University
61 questions
HPC 411 (Applied Business Tools)

Quiz
•
University
60 questions
CBT MOCK 3

Quiz
•
University
64 questions
THE ULTIMATE ITEC 101 MIDTERM REVIEWER

Quiz
•
University
65 questions
EC19P83 - Introduction to IoT

Quiz
•
University
60 questions
ISOM

Quiz
•
University
62 questions
QCM 1 - SF ADM

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade