During the deployment of a new system, the implementation team determines that APIs used to integrate the new system with a legacy system are not functioning properly. Further investigation shows there is a misconfigured encryption algorithm used to secure data transfers between systems. Which of the following should the project manager use to determine the source of the defined algorithm in use?
A) Code repositories
B) Security requirements traceability matrix
C) Software development lifecycle
D) Data design diagram
E) Roles matrix
F) Implementation guide
Correct Answer:
Verified
Q80: A security administrator wants to implement two-factor
Q81: A security engineer is deploying an IdP
Q82: A consulting firm was hired to conduct
Q83: The government is concerned with remote military
Q84: A security consultant is improving the physical
Q86: A large company with a very complex
Q87: A user asks a security practitioner for
Q88: A security engineer has been hired to
Q89: An organization has recently deployed an EDR
Q90: In the past, the risk committee at
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents