Answer: B
Hint: The requirements phase is not one of the five system cycle planning phases. The other two phases of the system life cycle are the Development/Acquisition phase and the Operations phase.
Answer: A
Hint: The other answers are distracters comprising components of the SDLC and the Acquisition cycle.
Answer: D
Hint: The other answers are distracters.
Answer: D
Hint: A program policy is used to create and define a computer security program; an issue specific policy addresses specific areas and issues; and a system specific policy focuses on decisions made by management.
Answer: A
Hint: The other answers are distracters
Answer: C
Answer: B
Hint: Answers A refers to the Initiation phase; answer C refers to the Operation/Maintenance phase; and answer D refers to the Disposal phase.
Answer: A
Hint: The other answers are distracters.
Answer: D
Hint: Delineating accreditation boundaries is a subset of answer A, system characterization.
Answer: A
Hint: Answer B describes the principles and practices found in NIST SP 800-14. Answers C and D are distacters.
Answer: C
Hint: Obtain accreditation is not one of the SE process activities, The other SE process activities are Design system architecture, develop detailed design, and implement system.
Answer: B
Answer: D
Hint: This task is performed under the Develop Detailed Security Design activity.
Answer: D
Hint: The other answers are distracters.
Answer: A
Hint: Functional decomposition is part of the Design System Security Architecture acivity of the ISSE process.
Answer: B
Answer: C
Answer: A
Hint: Answer B, Validation, is not a phase of the SDLC. Answers C and D are additional phases of the SDLC.
Answer: D
Hint: Answers A, B, and C are outputs of the Certification and Accreditation process
Answer: D
Hint: Defense of the enclave boundary is addressed in the Defense in Depth strategy.
Answer: A
Answer: A
Hint: Security categorization defines low, moderate, or high levels of potential impact on organizations as a result of a security breach. Answers B and C are other phases of the SDLC. Answer D is not a phase of the SDLC.
Answer: D
Hint: The other two types of attacks are insider and distribution.
Answer: A
Hint: This activity is performed in the initiation phase of the SDLC. Additional activities under the acquisition/development phase of the SDLC are risk assessment, assurance requirements analysis security, security planning, and security control development.
Answer: D
Answer: B
Hint: Additional activities under this phase include requirements analysis, alternatives analysis, and a software conversion study.
Answer: B
Hint: This model depicts the acquisition management process as a set of phases and decision points in a circular repredentation. The other answers are distracters.
Answer: C
Hint: Answer A is a threat-source, answer B defines risk, and answer D is the definition of vulnerability.
Answer: A
Answer: B