Your company has decided to use the SDLC to create and produce a new information system. You are training all users on how to protect company information while using the new system, along with being able to recognize social engineering attacks. Senior management must also formally approve of the system prior to it going live. In which of the following phases would these security controls take

place?

A. Operations and Maintenance
B. Initiation
C. Acquisition and Development
D. Implementation


D
Explanation: These security controls take place during the Implementation phase of the SDLC.
The steps in the Systems Development Life Cycle (SDLC) are as follows:
1. Initiate
2. Acquire/Develop
3. Implement
4. Operate/Maintain
5. Dispose

Computer Science & Information Technology

You might also like to view...

Identify the scrambler encoding methods that are commonly used in North America and Europe for T1 and T2 lines.

What will be an ideal response?

Computer Science & Information Technology

COGNITIVE ASSESSMENT If a dog is identified by scanning the shoulder or neck of the animal, what provides the information about the dog?

A. an animal ID processor B. an ALU C. a microchip D. a tattooed ID number identified by the scanning device

Computer Science & Information Technology

Case-Based Critical Thinking Question Risa has created a website for her interior decorating business. Before the publishes the site, she is making changes to improve its performance. Risa is combining 3 decorative images into a spritesheet. After she incorporates the spritesheet into her website, how many HTTP requests will be necessary to download all the images in the spritesheet?

A. 0 B. 1 C. 2 D. 3

Computer Science & Information Technology

Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port security for both wired and wireless LANs?

A. RADIUS B. ICMP C. FTP D. Telnet

Computer Science & Information Technology