IFSM 370 Quiz 3 - Business requirements

Question # 00791990 Posted By: dr.tony Updated on: 01/30/2021 12:14 PM Due on: 01/30/2021
Subject Education Topic General Education Tutorials:
Question
Dot Image

University of Maryland IFSM 370 Module 3 IFSM 370 Quiz 3

Mod3_Quiz_Needs Analysis and Business Requirements_

Question 1 Business requirements

a) are the same as telecommunications requirements

b) are determined by telecommunications requirements

c) determine telecommunications requirements

d) are only important to business users

Question 2 Business needs and solutions should be

a) combined to save valuable resources

b) developed and tested by the same person to ensure a thorough understanding of the problem

c) kept separate from each other to ensure that experts within their areas of expertise apply their respective knowledge

d) handled entirely by the IT department

 

Question 3 In the area of information needs, customers define more of the __________, and solution providers define more of the __________.

a) what, how

b) how, what

c) who, what

d) what, who

 

Risk Assessment and Risk Management

 

Question 4 A risk assessment is intended to

a) manage all the risks in the system

b) identify, prioritize, and estimate risks

c) implement all security controls required for the system

d) none of the above

 

Question 5 Disposition of risk can be accomplished via

a) acceptance of the risk

b) mitigation of the risk

c) transference of the risk

d) all of the above

e) none of the above

 

Question 6 Security controls

a) generally are more expensive than the data they must protect

b) are applied before the risk assessment and risk management activities

c) should be balanced with the operational and economic cost of the mission they support

d) should not be monitored after they have been implemented

 

Question 7 The risk management framework allows stakeholders to

a) select security controls

b) implement security controls

c) monitor security controls

d) all of the above

e) none of the above Security

 

Question 8 A key security control for providing confidentiality in communications systems is

a) biometrics

b) secure hash

c) encryption

d) DDoS

 

Question 9 A well-defined cloud service is

a) software as a service

b) biometric as a service

c) social networking as a service

d) none of the above

 

Question 10 A significant advantage of using cloud services is that

a) sensitive data can be easily stored without regard to privacy

b) international rules and regulatory compliance are not mandatory

c) all services are free and open source

d) centralized and integrated security services can mitigate many security concerns

Dot Image
Tutorials for this Question
  1. Tutorial # 00791158 Posted By: dr.tony Posted on: 01/30/2021 12:15 PM
    Puchased By: 2
    Tutorial Preview
    The solution of IFSM 370 Quiz 3 - Business requirements...
    Attachments
    IFSM_370_Quiz_3_-_Business_requirements.ZIP (18.96 KB)

Great! We have found the solution of this question!

Whatsapp Lisa