Sample questions
Q1. Which one of the following activities is performed during the development/implementation phase of the system development life cycle?
- Performing security testing on particular parts of the system that are developed or acquired
- Auditing
- Sensitive assessment
- Monitoring
Q2. Information leakage-related issues can be addressed through:
- Circumvent analysis
- Information channel assessment
- Covert channel analysis
- Channel security process
Q3. Which of the following software development models is an iterative model? (This is a drag-and-drop type of question. Here, you can draw a line from the list of answers on the left to the empty box on the right).
Q4. Validation is used to:
- Establish the adherence to software specifications
- Fitness to the system as per the design and requirements
- Monitor code review timelines
- Design user interfaces
Q5. The following list provides various phases of system security life cycle except:
- Integration phase
- Initiation phase
- Implementation phase
- Disposal phase
Q6....