The objectives of the software quality assurance process are to ensure that the software development and software assurance processes comply with software assurance plans and standards, and to recommend process improvement. This process uses the system requirements and information about the purpose and criticality of the software to evaluate the outputs of the software development and software assurance processes.
The objective of the software verification and validation (SV&V) process is to comprehensively analyze and test the software concurrently with processes of software development and software maintenance. The process determines that the software performs its intended functions correctly, ensures that it performs no unintended functions, and measures its quality and reliability. SV&V is a detailed engineering assessment for evaluating how well the software is meeting its technical requirements, in particular its safety, security, and reliability objectives, and for ensuring that software requirements are not in conflict with any standards or requirements applicable to other system components.
76. The Reference Monitor concept is which of the following?
a. It is dependent on mandatory access control policy.
b. It is independent of any access control policy.
c. It is independent of role-based access control policy.
d. It is dependent on discretionary access control policy.
77. Which of the following are essential activities of a comprehensive information security program for an organization on an ongoing basis?
1. Information preservation
2. Security test and evaluation
3. Security control monitoring
4. Security status reporting
a. 1 and 2
b. 2 and 3
c. 1 and 4
d. 3 and 4
78. Security certification is made in support of which of the following?
a. Security accreditation
b. Management controls
c. Operational controls
d. Technical controls
79. Which of the following is
a. To enable consistent assessment of security controls
b. To promote a better understanding of organization-wide risks
c. To deliver reliable information to management
d. To conduct reaccreditation reviews periodically
80. The security accreditation phase does
a. System security plan
b. System security assessment report
c. Plan of actions and milestones