PTS:1REF:4912.Which of the following is a key advantage of the bottom-up approach to security implementation?a.strong upper-management supportb.a clear planning and implementation processc.utilizes the technical expertise of the individual administratorsd.coordinated planning from upper managementANS: C
PTS:1REF:5313.Which of the following is a key step needed in order for a JAD approach to be successful?
PTS:1REF:5414.In which model in the SecSDLC does the work products of each phase fall intothe next phase to serve as its starting point?
PTS:1REF:5515.What is the first phase of the SecSDLC?
PTS:1REF:5516.In which phase of the SecSDLC does the risk management task occur?a.physical designc.investigationb.implementationd.analysisANS: D
PTS:1REF:5617.Blackmail threat of informational disclosure is an example of which threat category?