Which of the following should the project manager use to determine the source of the defined algorithm in use?

During the deployment of a new system, the implementation team determines that APIs used to integrate the new system with a legacy system are not functioning properly. Further investigation shows there is a misconfigured encryption algorithm used to secure data transfers between systems. Which of the following should the project manager use to determine the source of the defined algorithm in use?
A. Code repositories
B. Security requirements traceability matrix
C. Software development lifecycle
D. Roles matrix
E. Implementation guide

How to PASS CAS-004 in First Attempt?

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

2 thoughts on “Which of the following should the project manager use to determine the source of the defined algorithm in use?

  1. SRTM – this is what it is for….
    SRTM a grid that cross-references the requirements and implementation details . It shows relationships between security requirements, controls, and test/verification efforts.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.