Risk analysis is MOST useful when applied during which phase of the system development process?

iss midterm

Quiz
•
Other
•
University
•
Medium
Mạnh nguyễn
Used 5+ times
FREE Resource
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Requirements definition
Implementation planning
Project identification
System construction
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which must bear the primary responsibility for determining the level of protection needed for information systems resources?
Senior Management
Seniors security analysts
System auditors
IS security specialists
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes a covert timing channel?
Provides the timing trigger to activate a malicious program disguised as a legitimate function.
Used by a supervisor to monitor the productivity of a user without their knowledge
Allows one process to signal information to another by modulating its own use of system resources
Modulated to carry an unintended information signal that can only be detected by special, sensitive receivers.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is being considered as the most reliable kind of personal identification?
Finger print
Ticket Granting
Password
Token
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main responsibility of the information owner?
making the determination to decide what level of classification the information requires
periodically checking the validity and accuracy for all data in the information system
running regular backups
audit the users when they require access to the information
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is called the access protection system that limits connections by calling back the number of a previously authorized location?
Sendback forward systems
Callback forward systems
Sendback system
Callback systems
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is called a type of access control where a central authority determines what subjects can have access to certain objects, based on the organizational security policy?
Rule-based access control
Non-discretionary Access Control
Mandatory Access Control
Discretionary Access Control
Create a free account and access millions of resources
Similar Resources on Quizizz
63 questions
INFO 211 - CH 1

Quiz
•
University
59 questions
BAT401 Reviewer

Quiz
•
University
59 questions
Cyber Security Quiz

Quiz
•
University
65 questions
ASE A5 Certification Practice Test

Quiz
•
10th Grade - University
55 questions
final exam study(drivers ed)

Quiz
•
10th Grade - Professi...
60 questions
TEST MGT420

Quiz
•
University
60 questions
ISOM

Quiz
•
University
60 questions
PERCUBAAN pepereksaan akhir teori GM Sri Aman by cikgu mus

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade