Tag: security
Questions Related to security
-
Architecture principles have the highest precedence in the hierarchy of principles
-
Each project should define its own set of principles
-
Architecture principles are based on business principles
-
In a federated organization, each individual unit must, of necessity, be fully conformant to the
-
federation's principles
-
Architecture principles are generic, and can be shared between organizations without modification
-
classification scheme, method
-
picture, steps
-
process, model
-
process, schema
-
normalized schema, classification scheme
-
Architecture documents are used by every decision maker in the organization for every IT-related business decision.
-
focus on continuous improvement and optimizing its processes
-
integrate IT architecture with capital planning and expenditures
-
all of these
-
There are no unplanned IT investments or acquisitions.
-
True
-
False
-
Both a & b
-
None of the above
-
Group based access control should be implemented to assign permissions to application users
-
Consistent authorization checking should be performed on all application pages
-
A set of all allowable actions should be defined for each user role and all other's denied
-
All failed access authorization requests should be logged to a secure location for review by administrators
-
During testing
-
During development
-
During all phases of development starting with requirement analysis and ending with rollout
-
During design
-
Capture the customer requirements
-
Update the project plan
-
Capture and update the URS and SRS with security requirements for the project
-
None of the above
-
ASAP Team
-
Development Team
-
Testing Team
-
Project Management
-
Time and Money, Fixed price
-
Offshore, Onshore, Offshore-Onshore
-
Full-Fledged, Staggered, Fast Track
-
None of the above
-
Dynamic code analysis
-
Static code analysis
-
Both
-
None