Weekend Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Get Certified: Proven Methods to Pass the Software Certifications CSQA Exam

Questions 166

Though priority assigned to a defect is usually subjective, but are dependent on user input(s) or factor(s) such as:

Options:

A.

Importance of the defect

B.

Resources available to fix

C.

Risk

D.

A and B

E.

A, B, and C

Buy Now
Questions 167

Your IT director has asked you to write a policy on security for the organization. What type of control is that security policy?

Options:

A.

Preventive

B.

Detective

C.

Corrective

D.

None of the above

Buy Now
Questions 168

Evaluating and quantifying the risks, controls, and vulnerabilities is called _________ .

Options:

A.

Risk Analysis

B.

Risk Planning

C.

Risk

D.

Risk Management

Buy Now
Questions 169

Quality cannot be delegated.

Options:

A.

True

B.

False

Buy Now
Questions 170

Successful IT security programs consist of all the following EXCEPT:

Options:

A.

Developing an IT security policy that reflects business needs

B.

Informing users of their IT security responsibilities

C.

Establishing processes for monitoring and reviewing the program

D.

Gathering data on violations only

Buy Now
Questions 171

A "task force" is a cross-functional group organized for a specific purpose. Task force management principles include:

Options:

A.

Task force leader should be an expert in leading groups

B.

Task force should be organized for multiple purposes

C.

Task force needs a clear description of what is to be addressed

D.

All of the above

E.

A and C above

Buy Now
Questions 172

If you use the PDCA cycle for managing processes, which activity is associated with the planning component?

Options:

A.

Process Definition

B.

Process Mapping

C.

Process Measurement

D.

Process Improvement

E.

Process Controls

Buy Now
Questions 173

Preventive Controls include:

Options:

A.

Standards and Training

B.

Segregation of Duties and Authorization

C.

Forms Design and Documentation

D.

Consistency of Operations

E.

All of the above

Buy Now
Questions 174

The team for establishing a security baseline should consist of:

Options:

A.

Individuals responsible for computer security

B.

Auditors for internal control activities

C.

Senior management

D.

All employees

Buy Now
Questions 175

Critical Success Factors (CSF) are those criteria or factors that:

Options:

A.

Are critical to be defined

B.

Must be present in acquired software

C.

Are very desirable in the acquired software

D.

Will be defined during acceptance testing

E.

Are limited to functional requirements

Buy Now
Questions 176

When developing testing tactics for a project, which of the following should be considered?

Options:

A.

Determine the project scope

B.

Determine the type of development project

C.

Identify the tactical risks

D.

A and C

E.

A, B, and C

Buy Now
Questions 177

The code walkthrough and code inspection are the same thing.

Options:

A.

True

B.

False

Buy Now
Questions 178

If the data in a pie chart represent five components of a total population and four of the five sections of the pie chart represent 15%, 25%, 20%, and 20% of the total population, what percentage of the total population is the fifth section?

Options:

A.

100%

B.

40%

C.

20%

D.

5%

E.

None of the above

Buy Now
Questions 179

For maturing the management process at Level 3, which of the following should be in focus?

Options:

A.

Employee Suggestion System

B.

End-user Feedback System

C.

Employee Surveys

D.

Quality Planning

E.

None of the above

Buy Now
Questions 180

How do you objectively measure operational reliability?

Options:

A.

Customer satisfaction

B.

Mean time between failure

C.

Number of errors in outputs

D.

Function points per person month

Buy Now