Solutions
During which step of the application life cycle includes identification of
threats and vulnerabilities? Accurate Answer:- project initiation phase
What is the primary function of COCOMO? Accurate Answer:- cost
estimation
What is COCOMO Accurate Answer:- Construction Cost Model
What phases does the SDLC include? Accurate Answer:- 1. Plan/Initiate
Project
2. Gather Requirements
3. Design
4. Develop
5. Test/Validate
6. Release/Maintain
7. Certify/Accredit
8. Change Management and Configuration Management/Replacement
Auditing Accurate Answer:- the process of ensuring the corporate
secuirty policies are carried out consistently
dynamic data exchange Accurate Answer:- allows multiple applications
to share and exchange the same set of data
logging Accurate Answer:- helps and administrator to detect security
breaches and vulnerable points in a network
data control language Accurate Answer:- implements security through
access control and granular restrictions
resident virus Accurate Answer:- what virus is specifically designed to
infect programs as they are loaded into memory?
, testing and development Accurate Answer:- Which pair of processes
should be separated from each other to manage the stability of the test
environment
prototyping Accurate Answer:- the process of putting together a
working model, referred to as a prototype, to test various aspects of a
software design, to illustrate ideas or features, and to gather feedback in
accordance with customer requirements.
unit testing Accurate Answer:- product testing that is performed by the
developer, rather than the product testing team
heuristic antivirus Accurate Answer:- AV capable of detecting all types
of malicious code, including unknown malware
trojan horse Accurate Answer:- Which type of malicious attack typically
uses Visual Basic scripting?
capability maturity model Accurate Answer:- describes the principles,
procedures, and practices that should be followed in the software
development cycle
dynamic data exchange (DDE) Accurate Answer:- allows multiple
applications to share and exchange the same set of data
software escrow Accurate Answer:- sitation where a third party holds
the vendor's source code, in case the vendor goes out of business
planning phase Accurate Answer:- during which pase of the software
acquisition process do you document the software requriements?
1. software requirements are documented
2. acquisition strategy created
3. develop evaluation criteria Accurate Answer:- what steps should be
taken during the planning phase?
1. issue the request for proposal (RFP)
2. evaluate the proposals