In the company Vacuna System they have developed the entire forensic analysis process derived from a case of penetration into their networks and have already
In the company "Vacuna System" they have developed the entire forensic analysis process derived from a case of penetration into their networks and have already advanced in the process. What process follows once the digital information is collected and stored?
A)Collection of evidence
B)Analysis of the evidence
C)Chain of custody
2.The field of action of diagrams in the UML methodology is varied. What are the diagrams used to model the physical arrangement of software artifacts in nodes?
A)Implementation
B)Components
C) Deployment
3.There are various methodologies in software development. These can be adapted to different types of projects. What is the model that has grown in recent years derived from the notable increase in Internet use and technological maturity?
A)UML
B)scrum
C) continuous software release
4.In software development, an important part is project documentation. For which standard is document coding basic?
A)ISO 9000-2015
B)ISO 21000-2015
C)ISO 9001-2015
5.In software engineering, the UML methodology helps to better understand programs. What are the diagrams that model objects as instances of classes?
A) UML objects
B) UML classes
C) UML functions
6.Within software development there are different types, models and methodologies for its development. What are samples of these?
A) prototype model, spiral model and staged development
B) structured model, concurrent model and object-oriented model
C) spiral model, structured model and unified process
7.In companies, it is common to prepare software development projects with the aim of improving their processes. What are some of the activities included in the closure of the project?
A) learning, recognition of achievements and team dispersion
B) monitor deviations from the plan and take corrective actions
C) cost control, quality control and results reporting
8.UML diagrams are a very useful tool for software project management. The company requires making a diagram that shows the interaction between the system objects in a specific scenario. Which UML diagram should be used?
A)Activities
B)Sequence
C)Classes
9.
10.A new software development project is being developed at the company "Movie Car". It is necessary to improve human interactions and maintain a flow of conversation between the parties that allows a more dynamic and participatory development. What software development methodology allows the fulfillment of these requirements?
A)lean
B) DevOps
C) SCRUM
11.Functional requirements are an important part of systems development. These systems are made up of different requirements. What is the requirement for accuracy, validity, robustness, security and adaptability for input, processing, output and storage functions?
A)Control
B)Processing
C)Storage
12.As part of the studies, when developing a new information system there is one that allows a preliminary study to be carried out that investigates the needs of potential users and determines the requirements. What study is referred to?
A) Feasibility
B) Procedures
C)Availability
13.When companies decide to develop their own software, it is important to consider various factors. One of them is the implementation of software engineering. What are the objectives of software engineering?
A) development of quality software, increased productivity, decreased time and port security
B) development of quality software, increased productivity, decreased time and economical software development
C) improvement in security, increase in productivity, reduction of time and economic software development
14.It is important to establish the characteristics of a project. What process consists of planning and monitoring software development projects using the resources necessary to carry out the project?
A)Manage a project
B) Make a project more efficient
C) Project execution
15.Within software engineering there are several types of software testing. What are the software tests that are performed without running the application code?
A)Dynamics
B)Execution
C) Static
16.As part of the studies, when developing a new information system there is one that thoroughly studies the information needs of end users. What study is referred to?
A) Systems analysis
B) Systems development
C)Implementation of the systems
17.Currently, computer attacks have been growing due to the widespread use of computer networks. There are attacks whose purpose is to hinder, damage or prevent access to networks, systems or applications by depleting their resources. What type of attacks are being referred to?
A)viruses
B)DoS
C)trojan
18.A company's cybersecurity staff discovered an attack on a PC on the internal network. Checking the network protocol analyzers, they notice that the PC is currently on and demonstrating suspicious behavior. If it is necessary to collect evidence directly from the PC, in what order should it be done, taking into account the volatility of the PC information?
A)list open TCP and UDP ports and their associated applications, list users connected locally and remotely to the system and obtain system date and time
B) cache registers and contents, memory contents and status of network connections, route tables
C) list open TCP and UDP ports and their associated applications, list locally connected users and cache logs and contents
Step by Step Solution
There are 3 Steps involved in it
Step: 1
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started