Security accreditation is the formal authorization by the accrediting (management) official for system operation and an explicit acceptance of risk. It is usually supported by a review of the system, including its management, operational, and technical controls.
A system certification is conducted first and system accreditation is next because the former supports the latter. Security certification and security accreditation processes follow the system certification and system accreditation processes.
70. Which of the following is a nonresident virus?
a. Master boot sector virus
b. File infector virus
c. Macro virus
d. Boot-sector infector
71. Backdoors are which of the following?
a. They are entry points into a computer program.
b. They are choke points into a computer program.
c. They are halt points into a computer program.
d. They are exit points into a computer program.
72. Most Trojan horses can be prevented and detected by which of the following?
a. Removing the damage
b. Assessing the damage
c. Installing program change controls
d. Correcting the damage
73. From a risk analysis viewpoint, what does the major vulnerable area in a computer application system include?
a. Internal computer processing
b. System inputs and outputs
c. Telecommunications and networks
d. External computer processing
74. Which of the following is
a. Configuration file
b. Password file
c. Log file
d. System file
75. Which of the following software assurance processes is responsible for ensuring that any changes to software outputs during the system development process are made in a controlled and complete manner?
a. Software configuration management processes
b. Software project management processes
c. Software quality assurance processes
d. Software verification and validation processes
The objective of the project management process is to establish the organizational structure of the project and assign responsibilities. This process uses the system requirements documentation and information about the purpose of the software, criticality of the software, required deliverables, and available time and resources to plan and manage the software development and software assurance processes. It establishes or approves standards, monitoring and reporting practices, and high-level policy for quality, and it cites policies and regulations.