Which of the following are key activities performed during the deployment phase of the SDLC?
A. Map security and privacy requirements
B. Threat modeling and design review
C. Final security review and application security monitoring
D. Security test cases and dynamic analysis
Answer: C
Explanation: Final security review and application security monitoring and response plan and the two key activities performed during the deployment phase of the SDLC.
You might also like to view...
Assume that inputFile references a Scanner object that was used to open a file. Which of the following while loops is the correct way to read data from the file until the end of the file is reached?
a. while (inputFile.nextLine == " ") { ... } b. while (inputFile != null) { ... } c. while (!inputFile.EOF) { ... } d. while (inputFile.hasNext()) { ... }
It is best to use printed notes and rehearse before creating a narration recording
Indicate whether the statement is true or false
Which of the following is NOT a security concern of virtualized environments?
a. Virtual machines must be protected from both the outside world and from other virtual machines on the same physical computer. b. Physical security appliances are not always designed to protect virtual systems. c. Virtual servers are less expensive than their physical counterparts. d. Live migration can immediately move one virtualized server to another hypervisor.
Hypertext Markup Language is a data interchange standard for describing and delivering data to the web.
Answer the following statement true (T) or false (F)