1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hunter-Best [27]
3 years ago
5

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.

_________________________ Question 42 options:
Computers and Technology
1 answer:
navik [9.2K]3 years ago
6 0

Answer:

False

Explanation:

The Security Development Life Cycle (SDLC), is a software development which involves traditional approach towards its design such as, waterfall model, Agile, etc.

It can either be referred to as a generic secure development life cycle or a specific one, such as the Microsoft SDL or the Cisco SDL.

Its phases includes,

A1 - Security Assessment

A2 - Architecture

A3 - Design and Development 1

A4 - Design and Development 2

A5 - Ship

PRSA - Post Release

Each phase talks about how a secured software is developed.

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. This statement is false because by definition and attributes Security Development Life Cycle is a traditional approach towards software development and not a general method.

You might be interested in
A search engine that crawls uses
RoseWind [281]

Answer:

web crawlers or spider software

Explanation:

A search engine that crawls uses the web crawler or the spider software. And it also uses the server side JavaScript based crawlers and programming languages like Python and PHP. The search engine finds the content category through the meta keywords and directs the page to the index. The index contains details of similar types of pages, And each page has one category, and if category is not found which is rarest, a new category is being created.

7 0
3 years ago
Which decimal number is equivalent to this hexadecimal number?<br> F8
emmainna [20.7K]

Explanation: The numbers in a hex are the same as decimal numbers: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9. The big difference between a hex and a decimal is that a hex also contains letters. These letters are: A, B, C, D, E, F. A hex number can be represented using a subscript of 16.

3 0
3 years ago
Read 2 more answers
Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ___ s
77julia77 [94]

Answer:

Cloud

Explanation:

Cloud computing is a central form of storing data on a data center, provided online, to provides inexpensive and secure storage facilities and central accessing of document, using any device and accessing the data from anywhere and time.

Data stored in a clients computer system, would have to be transferred to another remote computer by using a portable storage, to share data. Using a cloud service or a database center service, a document can be accessed by a group of users at the same time, in different places, and assures a secure data in the database.

3 0
3 years ago
What command can be used to export an nps backup file named npsconfig.xml that can be used to restore nps configuration on anoth
irakobra [83]

The command is Export-NpsConfiguration    

An admin can export the entire NPS configuration from one NPS for import to another NPS. Standard precautions should be taken when exporting NPS configurations over the network. The command syntax that can be used for exporting the NPS configurations is Export-NpsConfiguration –Path <filename>


3 0
3 years ago
How does a barcode work?
Genrish500 [490]
A barcode's bars have 

1. different thicknesses, so they each signify 1 or 2 nibbles. 
2. the combinations of the thicknesses of those bars exceed the trillions. That's why manufacturers and stores never run out of SKU barcodes.
4 0
3 years ago
Other questions:
  • Why should you thank the customer after resolving an issue?
    7·2 answers
  • PLZZZ HELP 30 POINTS!!
    14·1 answer
  • Lydia noticed that she feels tired and out of breath after walking her dog up a hill in the park. Which area of fitness does she
    8·1 answer
  • Create a function called "strip_r_o" that takes in a STRING and strips all the Rs and Os from the string. Also use a FOR loop in
    7·1 answer
  • What technology did one of the student's have to learn to use in order to help him with his homework in the film, "Disconnected:
    11·2 answers
  • A RISC processor has 186 total registers, with 18 global registers. There are 12 register windows, each with 10 locals. How many
    5·1 answer
  • How does Shakespeare immediately introduce Tybalt as a menacing character?
    9·1 answer
  • Write a program that repeatedly takes integers from the user as long as he
    7·1 answer
  • What is a file path?
    7·1 answer
  • What is the difference between PowerPoint and Outlook?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!