Question 1 Business requirements : a) are the same as telecommunications require
ID: 3568211 • Letter: Q
Question
Question 1
Business requirements : a) are the same as telecommunications requirements b) are determined by telecommunications requirements c) determine telecommunications requirements d) are only important to business users
Question 2
Business needs and solutions should be : a) combined to save valuable resources b) developed and tested by the same person to ensure a thorough understanding of the problem c) kept separate from each other to ensure that experts within their areas of expertise apply their respective knowledge d) handled entirely by the IT department
Question 3
In the area of information needs, customers define more of the __________, and solution providers define more of the __________. a) what, how b) how, what c) who, what d) what, who
Question 4
A risk assessment is intended to a) manage all the risks in the system b) identify, prioritize, and estimate risks c) implement all security controls required for the system d) none of the above
Question 5
Disposition of risk can be accomplished via
a) acceptance of the risk b) mitigation of the risk c) transference of the risk d) all of the above e) none of the above
Question 6
Security controls
: a) generally are more expensive than the data they must protect b) are applied before the risk assessment and risk management activities c) should be balanced with the operational and economic cost of the mission they support d) should not be monitored after they have been implemented
Question 7
The risk management framework allows stakeholders to
: a) select security controls b) implement security controls c) monitor security controls d) all of the above e) none of the above
Question 8
A key security control for providing confidentiality in communications systems is Question 8 options: a) biometrics b) secure hash c) encryption d) DDoS
Question 9
A well-defined cloud service is
a) software as a service b) biometric as a service c) social networking as a service d) none of the above
Question 10
A significant advantage of using cloud services is that
: a) sensitive data can be easily stored without regard to privacy b) international rules and regulatory compliance are not mandatory c) all services are free and open source d) centralized and integrated security services can mitigate many security concerns
Explanation / Answer
Question 1
Business requirements consist of all the requirements to meet to develop a successful system.
That is, the produced system must meet these business requirements.
Thus, compare the business requirements with the telecommunication requirements, because the telecommunication system must meet some requirements to give good communication.
Hence the correct option is “c) determine telecommunications requirements”.
Question 2
While developing the business needs in different stages, different experts are involved in solution strategy.
Hence, the correct option is “c) kept separate from each other to ensure that experts within their areas of expertise apply their respective knowledge”.
Question 3
Hence, the correct option is “a) what, how”
Question 4
The definition of Risk management is “identifying, prioritizing, and estimating risks”.
Hence, the correct option is “b) identifies, prioritize, and estimate risks”.
Question 5
Risk disposition is assigned to each identified risk. Risk disposition is to determine the strategy to follow for each identified risk.
Hence, the correct option is “d) all of the above”
Question 6
Security controls help to mitigate the risk. But the organizations have to maintain the security controls within their operational and economical costs.
Hence, the correct option is “c) should be balanced with the operational and economic cost of the mission they support”
Question 7
Risk management framework consist several steps as follows:
Hence, the correct option is “d) all of the above”
Question 8
In a communication system, confidentiality property does not allow the unauthorized user to know the data.
Communication systems, encryption is used to maintain the confidentiality so that the attacker cannot see the message, except the original end users.
Hence, the correct option is “c) encryption”
Question 9
Cloud computing provides services rather than products. According to the definition, cloud computing provides the following services:
Hence, the correct option is “a) software as a service”.
Question 10
A cloud service is a centralized service.
Hence the correct option is “d) centralized and integrated security services can mitigate many security concerns.”
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.