Which of the following tasks are completed during the Acquire or Develop step in the Security System Development Life Cycle?
A. Assess the system's risk.
B. Determine the security category of the system.
C. Integrate security into the system.
D. Review operational readiness.
A
Explanation: During the Acquire or Develop step of the Security System Development Life Cycle, you should assess the system's risk.
Computer Science & Information Technology
You might also like to view...
Data validation is a ________
A) set of rules or constraints B) set of drop down options C) set of formatting codes D) set of masking characters
Computer Science & Information Technology
Giving a single name to behaviors that are operationally different but conceptually the same is called
a. algorithm development b. software engineering c. polymorphism d. inheritance
Computer Science & Information Technology