Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Successful IT security programs consist of all the following EXCEPT:

A.

Developing an IT security policy that reflects business needs

B.

Informing users of their IT security responsibilities

C.

Establishing processes for monitoring and reviewing the program

D.

Gathering data on violations only

If the data in a pie chart represent five components of a total population and four of the five sections of the pie chart represent 15%, 25%, 20%, and 20% of the total population, what percentage of the total population is the fifth section?

A.

100%

B.

40%

C.

20%

D.

5%

E.

None of the above

Determining that the COTS software selected is compatible with the acquiring organization's computer environment addresses:

A.

Compatibility with other COTS software packages

B.

Compatibility with the acquiring organization's computer language

C.

Compatibility with the SEI CMMI level of the organization that built the COTS software

D.

Compatibility of the acquiring organization's acceptance test process

E.

Compatibility with the acquiring organization's hardware and operating system

The code walkthrough and code inspection are the same thing.

A.

True

B.

False

The definition for Reliability is:

A.

The amount of computing resources and code required by a program to perform a function.

B.

Extent to which access to software or data by unauthorized persons can be controlled.

C.

Effort required learning, operating, preparing input, and interpreting output of a program.

D.

Effort required locating and fixing an error in an operational program.

E.

None of the above

As the management philosophy matures from 'authoritarian' to 'empowered teams', the role of a QA Analyst moves from 'quality control' to that of:

A.

Senior QA

B.

QA Manager

C.

Tester

D.

QA Consultant

Tactical Planning answers the question:

A.

What to do?

B.

How to do it?

C.

What objectives need to be accomplished?

D.

How IT customers will be satisfied?

E.

How customer satisfaction will be exceeded?

Which one of the following best describes "mission statement" for a company or an organization?

A.

How will we show success?

B.

How will we achieve objectives?

C.

Why do we exist?

D.

What is our long term program?

Which item(s) below are measures of central tendency?

A.

Mean

B.

Median

C.

Mode

D.

All of the above

E.

A and C above

It is very easy to distinguish between accidental loss and intentional loss, with respect to security activities.

A.

True

B.

False

Which of the following activities should occur before processes are defined to ensure that the most critical processes are defined first.

A.

Do

B.

Design

C.

Implementation

D.

Check

E.

None of the above

The rules used to evaluate products and identify non-conformance are:

A.

Audits

B.

Policies

C.

Standards

D.

Templates

What should post-implementation audits NOT be used for?

A.

Determine if system objectives were met

B.

Determine if standards were followed

C.

Determine who is to blame for project problems

D.

Determine if IT quality objectives were achieved

The loss associated with risks can be calculated as follows:

A.

The cost of controls to minimize the risk

B.

The probability of an undesirable event occurring times the loss associated with the event

C.

Implement cost-of-quality accounting

D.

Obtain loss from a control chart

E.

Use budgetary accounting

While unit testing should be done, it is not necessary to spend the time and effort to develop and document the unit test plan and cases because it is conducted by the developers themselves.

A.

True

B.

False