A specialized security administrator responsible for performing systems development life cycle (SDLC) activities in the development of a security system is known as __________.

A. a security technician
B. a security analyst
C. a security consultant
D. a security manager


Answer: B

Computer Science & Information Technology

You might also like to view...

The distribution of bits in a random number sequence should be ___________ , therefore the frequency of occurrence of ones and zeros should be approximately equal.

A. independent B. uniform C. reversed D. streamed

Computer Science & Information Technology

Match each term with the correct statement below.

A. RF interference that affects the entire frequency band, such as the entire 2.4-GHz band B. any undesirable electrical energy emitted within the frequency range dedicated to RF transmissions C. a WLAN that uses a reduced power output from the AP; results in a smaller coverage area but can allow for increased performance due to channel reuse D. RF interference that covers all bands of the RF spectrum E. wireless networks that are used in areas in which large numbers of device are clustered close together F. an undesirable electronic disturbance, either manmade or natural, which causes an undesirable degrading in the performance of electrical equipment G. an IP address that begins with the IP range 169.254.x.x and is assigned if a device cannot receive a valid IP H. RF interference that is usually generated by television, radio, and satellite transmitters I. transmission problem involving two wireless devices, in which the wireless device closest to the AP transmits at a higher power than the other, more distant device, thereby overwhelming the weaker signal from the distant device J. the area between two APs in which a wireless device begins to search for a new AP with which to associate

Computer Science & Information Technology

To delete a hyperlink, what should you click in the Edit Hyperlink dialog box?

A) Remove Link B) Cancel Link C) Delete Link D) Stop Link

Computer Science & Information Technology

What two virtual hardware devices can be added to a powered on VM? (Choose two.)

A. Virtual disk connected using SCSI controller B. Virtual disk connected using IDE controller C. Network adapter D. Serial Port

Computer Science & Information Technology