42. Which of the following occurs after delivery and installation of a new information system under acquisition?
a. Unit testing
b. Subsystem testing
c. Full system testing
d. Integration and acceptance testing
43. Which of the following should be done prior to final system deployment for operation?
a. Conduct a security certification process.
b. Describe the known vulnerabilities in the system.
c. Establish control verification techniques to provide confidence.
d. Document the safeguards that are in place to protect the system.
44. The security accreditation decision reflects which of the following?
a. Test-based decision
b. Risk-based decision
c. Evaluation-based decision
d. Results-based decision
45. Which of the following are the two key information security steps of the operation phase within the system development life cycle (SDLC)?
1. Information preservation
2. Security accreditation
3. Configuration management and control
4. Continuous monitoring
a. 1 and 2
b. 2 and 3
c. 1 and 4
d. 3 and 4
46. Which of the following are ways to accomplish ongoing monitoring of security control effectiveness?
1. Security reviews
2. Self-assessments
3. Security test and evaluation
4. Independent security audits
a. 1 and 2
b. 2 and 3
c. 1 and 4
d. 1, 2, 3, and 4
47. Which of the following is a good definition of security control monitoring?
a. Verifying the continued effectiveness of security controls over time
b. Verifying the continued efficiency of security controls over time
c. Verifying the development effectiveness of security controls over time
d. Verifying the planning effectiveness of security controls over time
48. Which of the following statements is not true about a system development life cycle (SDLC) process?
a. Systems undergo improvements in technology.
b. Security plans evolve with the follow-on system.
c. There is a definitive end to an SDLC.
d. Much of previous operational controls are relevant to the follow-on system.