1. Right Answer: D
Explanation: Information security should be considered at the earliest possible stage. Security requirements must be defined before you enter into design specification, although changes in design may alter these requirements later on. Security requirements defined during system implementation are typically costly add-ons that are frequently ineffective. Application security testing occurs after security has been implemented.
2. Right Answer: D
Explanation:
3. Right Answer: C
Explanation: Reference https://www.isaca.org/Knowledge-Center/Documents/Glossary/glossary.pdf
4. Right Answer: D
Explanation:
5. Right Answer: C
Explanation: