Question 1 Business requirements : a) are the same as telecommunications require
ID: 3568212 • Letter: Q
Question
Question 1
Business requirements : a) are the same as telecommunications requirements b) are determined by telecommunications requirements c) determine telecommunications requirements d) are only important to business users
Question 2
Business needs and solutions should be : a) combined to save valuable resources b) developed and tested by the same person to ensure a thorough understanding of the problem c) kept separate from each other to ensure that experts within their areas of expertise apply their respective knowledge d) handled entirely by the IT department
Question 3
In the area of information needs, customers define more of the __________, and solution providers define more of the __________. a) what, how b) how, what c) who, what d) what, who
Question 4
A risk assessment is intended to a) manage all the risks in the system b) identify, prioritize, and estimate risks c) implement all security controls required for the system d) none of the above
Question 5
Disposition of risk can be accomplished via
a) acceptance of the risk b) mitigation of the risk c) transference of the risk d) all of the above e) none of the above
Question 6
Security controls
: a) generally are more expensive than the data they must protect b) are applied before the risk assessment and risk management activities c) should be balanced with the operational and economic cost of the mission they support d) should not be monitored after they have been implemented
Question 7
The risk management framework allows stakeholders to
: a) select security controls b) implement security controls c) monitor security controls d) all of the above e) none of the above
Question 8
A key security control for providing confidentiality in communications systems is Question 8 options: a) biometrics b) secure hash c) encryption d) DDoS
Question 9
A well-defined cloud service is
a) software as a service b) biometric as a service c) social networking as a service d) none of the above
Question 10
A significant advantage of using cloud services is that
: a) sensitive data can be easily stored without regard to privacy b) international rules and regulatory compliance are not mandatory c) all services are free and open source d) centralized and integrated security services can mitigate many security concerns
Explanation / Answer
1)
Business requirements consists what are the requirements to meet to develop a successful system.
That is, the produced system must meet these business requirements.
Thus, we can compare business requirements with telecommunication requirements, because the telecommunication system must meet some requirements to give good communication.
Hence the correct option is “c) determine telecommunications requirements ”.
2)
While developing the bussines needs in different stages, different experts are involved in solution stratagy.
Hence the correct option is “c) kept separate from each other to ensure that experts within their areas of expertise apply their respective knowledge ”.
3)
In the requirement analysis phase, the experts collect the requirements of the customer.
The customer explains exactly ‘what’ he expecting or he requires.
Then the experts or solution providers think ‘how’ to achieve the requirements of the customer. That is how to develop the system that meets the customer requirements.
Hence, the correct option is “a) what , how”
4)
The definition of Risk management is “identifying, prioritizing, and estimating risks”.
Hence the correct option is “b) identify, prioritize, and estimate risks”.
5)
Risk disposition is assigned to each identified risk. Risk disposition is nothing but to determine the strategy to follow for each identified risk.
risk acceptance , risk avoidance, risk transfer, risk mitigation, risk monitoring, etc includes risk disposition.
Hence the correct option is “d) all of the above”
6)
Security controls helps to mitigate the risk. But the organizations maintains have to maintain the security controls within their operational and economical costs.
Hence the correct option is “c) should be balanced with the operational and economic cost of the mission they support”
7)
Risk management framework consist several steps like, selecting security controls, implementing security controls, assessing security controls, authorizing systems, monitoring security controls and categorizing systems. Here the stakeholders are management, help desk people, etc.
Hence the correct option is “d) all of the above”
8)
In communication system, confidentiality property does not allow the unauthorized user to know the data.
Communication systems, encryption is used to maintain the confidentiality so that the attacker cannot see the message, except the original end users.
Hence the correct option is “c) encryption”
9)
According to definition, cloud computing provides three services, software as a service(Saas),platform as a service(Paas) and infrastructure as a service(Iaas).
Hence the correct option is “a) software as a service”.
10)
Cloud services is a centralized service.
Hence the correct option is “d) centralized and integrated security services can mitigate many security concerns.”
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.