Icon New game New game
Get Academic Plan

Systems Lifecycle Management (Part 02) [D2]

Quiz

Systems Lifecycle Management (Part 02) [D2]

Download the paper version to play

1 times made

Created by

Czech Republic

Top 10 results

There are still no results for this game. Be the first to stay in the ranking! to identify yourself.
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

Systems Lifecycle Management (Part 02) [D2]Online version

Systems Lifecycle Management (Part 02) [D2]

by Jorge Carrillo. PhD
1

In ISO 15288, what is the purpose of Agreement Processes (Acquisition/Supply)?

2

Using prod data in a test env requires which security control?

3

Difference between Due Care and Due Diligence?

4

Why is RoE (Rules of Engagement) for pentest critical?

5

Which scan gives the least network traffic and best patch detail?

6

Why is the waterfall model criticised for security?

7

Primary risk of Configuration Drift?

8

What is the goal of fuzzing?

9

SaaS security flaw: vendor uses AWS. What is the flaw?

10

DevSecOps, who is responsible for security?

11

Prerequisite for a Bug Bounty program?

12

Why seek FIPS 140-2/3 validation for crypto modules?

13

Best detection for Race Condition vulnerabilities?

14

What does File Integrity Monitoring (FIM) primarily detect?

15

Why is Code Signing critical for software supply chain?

16

Encrypt data at rest in requirements: Functional or Non-Functional?

17

You are using "Containerization" (e.g., Docker). What is a specific security risk introduced by this technology?

18

Defining characteristic of a Sandbox environment?

19

MTTR metric usefulness?

20

When to conduct Security Impact Analysis (SIA)?

21

Printer disposal security concern?

22

Why are Logic Bombs hard to detect?

23

Why SoD (Separation of Duties) matters in deployment?

24

When is an Interconnection Security Agreement (ISA) required?

Feedback

Focuses on contractual security obligations.

To protect PII while allowing realistic testing.

Care = action; Diligence = verification.

Prevents out-of-scope activity and liability.

Authenticated access reveals installed software and patches.

Early security integration is expensive if late.

Drift undermines defined security controls.

Finds memory errors and robustness issues.

Cloud provider shares security duties with customer.

Security is a team effort with tooling.

Need triage/w remediation process.

Validation validates implementation and key handling.

Timing/logic issues are hard to detect dynamically.

Alerts on file hash changes and integrity.

Verifies origin and unaltered code.

Encryption is a system attribute, not a behavior.

Kernel compromise can impact all containers.

Isolation protects production network.

Lower MTTR means faster remediation.

Assess risks prior to change approval.

Data remanence risk in devices.

Difficult for automated scanners to trigger.

Prevents fraud and errors via checks.

Defines secure data exchange requirements.