Q.1
The review process for a particular review begins with a _____________ by the author to the moderator in formal review.
  • a) Request For Review
  • b) Requirement Analysis
  • c) Notice For Review
  • d) Goal Design
Q.2
Configuration management procedures be implemented during ____________
  • a) Test Execution
  • b) Test Planning
  • c) Test Design
  • d) Test Success
Q.3
______________ is a process which is intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended.
  • a) Integrity Testing
  • b) Unit Testing
  • c) Security Testing
  • d) Stress testing
Q.4
_______________ of information refers to protecting information from being modified by unauthorized parties.
  • a) Confidentiality
  • b) Authentication
  • c) Authorization
  • d) Integrity
Q.5
________________ means to ensure that a transferred message has been sent and received by the intended parties who are claiming to have sent and received the message.
  • a) Confidentiality
  • b) Authentication
  • c) Non-repudiation
  • d) Integrity
Q.6
_____________ looks for known security issues by using automated tools to match conditions with known vulnerabilities.
  • a) Discovery
  • b) Vulnerability Scan
  • c) Security Assessment
  • d) Penetration Test
Q.7
__________ uses discovery and vulnerability scanning to identify security vulnerabilities
  • a) Discovery
  • b) Vulnerability Scan
  • c) Vulnerability Assessment
  • d) Penetration Test
Q.8
_________ is driven by an Audit or a Risk function to look at a specific control or compliance issue.
  • a) Security Audit
  • b) Vulnerability Scan
  • c) Vulnerability Assessment
  • d) Penetration Test
Q.9
________________ simulates an attack by a malicious party.
  • a) Security Audit
  • b) Vulnerability Scan
  • c) Vulnerability Assessment
  • d) Penetration Test
Q.10
______________ builds upon Vulnerability Assessment by adding manual verification to confirm exposure.
  • a) Security Audit
  • b) Security Assessment
  • c) Vulnerability Assessment
  • d) Penetration Test
0 h : 0 m : 1 s