A replacement application has had its business case approved. In preparation for a requirements workshop, an architect is working with you to ensure that appropriate security requirements have been captured. Which of the following documents BEST captures the security requirements?

A. Solution overview document
B. Use case document
C. Security requirements traceability matrix
D. Business requirements document


D
Explanation: The business requirements document best captures the security requirements.
The solution overview document describes the overall solution but does not list any specifics. The Use case document details how the new solution will be used. The security requirements traceability matrix maps the security requirements to the controls that are employed for the requirements but is not used to initially map the security requirements.

Computer Science & Information Technology

You might also like to view...

You can set the number of undo actions allowed in PowerPoint up to 300

Indicate whether the statement is true or false

Computer Science & Information Technology

To make data easier to understand, use a ________ instead of a table of numbers

A) chart B) relative cell reference C) data marker D) data point

Computer Science & Information Technology

FIGURE 7-1Given the code snippet below, Figure 7-1 above illustrates the ____ event.

A. onMouseOut B. onMouseOver C. turnBlue() D. turnRed()

Computer Science & Information Technology

?In a sequence diagram, a _____ represents the time during which an object above it is able to interact with the other objects in the use case.

A. ?focus point B. ?schematic matrix C. ?validity link D. ?lifeline

Computer Science & Information Technology