42. Which of the following occurs after delivery and installation of a new information system under acquisition?
a.
Unit testingb.
Subsystem testingc.
Full system testingd.
Integration and acceptance testing43. Which of the following should be done prior to final system deployment for operation?
a.
Conduct a security certification process.b.
Describe the known vulnerabilities in the system.c.
Establish control verification techniques to provide confidence.d.
Document the safeguards that are in place to protect the system.44. The security accreditation decision reflects which of the following?
a.
Test-based decisionb.
Risk-based decisionc.
Evaluation-based decisiond.
Results-based decision45. Which of the following are the two key information security steps of the operation phase within the system development life cycle (SDLC)?
1.
Information preservation2.
Security accreditation3.
Configuration management and control4.
Continuous monitoringa.
1 and 2b.
2 and 3c.
1 and 4d.
3 and 446. Which of the following are ways to accomplish ongoing monitoring of security control effectiveness?
1.
Security reviews2.
Self-assessments3.
Security test and evaluation4.
Independent security auditsa.
1 and 2b.
2 and 3c.
1 and 4d.
1, 2, 3, and 447. Which of the following is a good definition of security control monitoring?
a.
Verifying the continued effectiveness of security controls over timeb.
Verifying the continued efficiency of security controls over timec.
Verifying the development effectiveness of security controls over timed.
Verifying the planning effectiveness of security controls over time48. Which of the following statements is not true about a system development life cycle (SDLC) process?
a.
Systems undergo improvements in technology.b.
Security plans evolve with the follow-on system.c.
There is a definitive end to an SDLC.d.
Much of previous operational controls are relevant to the follow-on system.