1.
Which of the following subphases are defined in the maintenance phase of the life cycle models?
2.
Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?
.
3.
Which of the following characteristics are described by the DIAP Information Readiness Assessment function? Each correct answer represents a complete solution. Choose all that apply.
4.
Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?
5.
Which of the following is NOT a valid maturity level of the Software Capability Maturity Model (CMM)?
6.
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
7.
Which of the following relies on a physical characteristic of the user to verify his identity?
8.
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?
9.
Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems?
10.
SIMULATION
Fill in the blank with an appropriate phrase.________ models address specifications, requirements, and design, verification and validation, and maintenance activities.
Correct Answer: Life cycle
Section: (none)
Explanation
Explanation/Reference:You are the project manager of the GHE Project. You have identified the following risks with the characteristics as shown in the following figure:
How much capital should the project set aside for the risk contingency reserve?