please answer the following - Please select all that apply: 1. Some considerations for developing NFR's include? Auditability Backup and Restore Portability Conversion 2.Access Control services provide? Enforcement of Access Controls Enforcement of rules for changing access control rules Audit logging of access Access control attributes of files 3.Security logon banners provide the following protections? Deterrent Legal Protections Liability Protections Policy Awareness 4. Most of the cost of software defects are realized in what phase of the SDLC? Requirements and Design Implementation Testing Maintenance 5. "When it comes to Identity security requirements, the following security attributes for each user should be recorded?" User ID Group Membership Phone Number Security Privileges
please answer the following - Please select all that apply:
1. Some considerations for developing NFR's include?
Auditability
Backup and Restore
Portability
Conversion
2.Access Control services provide?
Enforcement of Access Controls
Enforcement of rules for changing access control rules
Audit logging of access
Access control attributes of files
3.Security logon banners provide the following protections?
Deterrent
Legal Protections
Liability Protections
Policy Awareness
4. Most of the cost of software defects are realized in what phase of the SDLC?
Requirements and Design
Implementation
Testing
Maintenance
5. "When it comes to Identity security requirements, the following security attributes for each user should be recorded?"
User ID
Group Membership
Phone Number
Security Privileges
Trending now
This is a popular solution!
Step by step
Solved in 5 steps