Weekend Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which type of cybersecurity threat collects information from a system without authorization?

A.

Ransomware

B.

Brute force attack

C.

Spyware

D.

Man-in-the-middle

Which statement describes the development phase of the systems development life cycle (SDLC)?

A.

Physically constructing software and information systems using programming languages

B.

Performing corrections, additions, and upgrades to ensure the system continually meets business goals

C.

Bringing project pieces together, checking interoperability, and verifying functionality

D.

Placing the software or information system into production to allow users to perform business operations

What is the goal of the maintenance phase in the system development life cycle (SDLC)?

A.

To fix defects and update the software

B.

To gather initial business requirements

C.

To conduct unit testing and receive feedback

D.

To design and deploy the software architecture