Which of the following are key activities performed during the deployment phase of the SDLC?

A. Map security and privacy requirements
B. Threat modeling and design review
C. Final security review and application security monitoring
D. Security test cases and dynamic analysis


Answer: C
Explanation: Final security review and application security monitoring and response plan and the two key activities performed during the deployment phase of the SDLC.

Computer Science & Information Technology

You might also like to view...

Assume that inputFile references a Scanner object that was used to open a file. Which of the following while loops is the correct way to read data from the file until the end of the file is reached?

a. while (inputFile.nextLine == " ") { ... } b. while (inputFile != null) { ... } c. while (!inputFile.EOF) { ... } d. while (inputFile.hasNext()) { ... }

Computer Science & Information Technology

It is best to use printed notes and rehearse before creating a narration recording

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is NOT a security concern of virtualized environments?

a. Virtual machines must be protected from both the outside world and from other virtual machines on the same physical computer. b. Physical security appliances are not always designed to protect virtual systems. c. Virtual servers are less expensive than their physical counterparts. d. Live migration can immediately move one virtualized server to another hypervisor.

Computer Science & Information Technology

Hypertext Markup Language is a data interchange standard for describing and delivering data to the web.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology