56. Effective control is achieved when configuration management control is established prior to the start of which of the following?
a. Requirements analysis
b. Design
c. Coding
d. Testing
Requirements analysis is incorrect because it focuses on gathering requirements to understand the nature of the programs to be built. The design must be translated into code-readable form. The coding step performs this task. Code is verified, for example, through the inspection process and put under configuration management control prior to the start of formal testing. After code is generated, program testing begins. The testing focuses on the logical internals of the software, ensuring that all statements have been tested, and on the functional externals; that is, conducting tests to uncover errors to ensure that the defined input can produce actual results that agree with required results.
57. The security-planning document developed in the development/acquisition phase of a system development life cycle (SDLC) does
a. System interconnection agreements
b. Security tests and evaluation results
c. Request for proposal
d. Plan of actions and milestones
58. A worm has infected a system. What should be the first step in handling the worm incident?
a. Analyze the host computer.
b. Disconnect the infected system.
c. Analyze the server.
d. Identify the worm’s behavior.
59. A worm has infected a system. From a network traffic perspective, which of the following contains more detailed information?
a. Network-based IDS and firewalls
b. Routers
c. Host-based IDS and firewalls
d. Remote access servers
Network-based IDS is incorrect because it indicates which server was attacked and on what port number, which indicates which network service was targeted. Network-based firewalls are typically configured to log blocked connection attempts, which include the intended destination IP address and port number. Other perimeter devices that the worm traffic may have passed through, such as routers, virtual private network (VPN) gateways, and remote access servers may record information similar to that logged by network-based firewalls.