Which of the following developmental policies can help an IT department address secure programming issues?

A) All code must be checked for back doors and Trojan horses.
B) All buffers must have error handling to prevent buffer overruns.
C) All communication must adhere to an organization's secure communications guidelines.
D) All of the above


D) All of the above

Computer Science & Information Technology

You might also like to view...

Which of the following choices is not in the same family as the other choices, in that they provide guidelines and associated supporting documentation that defines standard terminology and specific required elements and practices?

A. ISO 15504 B. CMMI C. ISO 16488 D. ISO 15408

Computer Science & Information Technology

What was the first word processing application?

a. Word for MS-DOS b. WordPerfect c. WordStar d. Alto

Computer Science & Information Technology

Which of the following best describes role-based access control?

A. The information owner decides who has access to resources. B. Access to resources is determined based on the need to know principle. C. Access to resources is decided by the system based on the concept of subjects, objects, and labels. D. Users are grouped based on a common access need, such as job function.

Computer Science & Information Technology

A mail server maintains _______________, separate holding areas for each user's messages.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology