SSA Audits Interview Question-Answer

Q.1 Which of the following approaches generates a report with SWOT analysis?

       A. Technical Review

       B. Process Audit

       C. Process Maturity Review

Ans : Process Audit

Q.2 Which of the following is a highly data-oriented review that provides independent inputs on SSA strategies?

       A. Process Maturity Review

       B. Technical Review

       C. Process Audits

       D. Governance Review

Ans : Governance Review

Q.3 Which of the following properties aim to generate a trail to identify the source and path of attack?

       A. Repudiation

       B. Resilience

       C. Traceability

       D. Accountability

Ans : Traceability

Q.4 Which of the following is an intensive review performed to confirm compliance with the customer’s security, privacy, and reliability requirements?

       A. Process Maturity Review

       B. Process Audits

       C. Technical Review

Ans : Process Maturity Review

Q.5 The safeguards that are integrated throughout the delivery lifecycle by SSA, making solutions and services reliable, resilient, and immune to attacks and failures are _________.

       A. Security, Confidentiality, Integrity, Availability

       B. Resilience, Traceability, Reliability

       C. Security, Privacy, Reliability

       D. Confidentiality, Integrity, Availability

Ans : Security, Confidentiality, Integrity, Availability

Q.6 How often are Process Maturity Reviews conducted?

       A. With major releases

       B. Half Yearly

       C. Monthly

       D. Quarterly

Ans : Half Yearly

Q.7 Which of the following approaches are adopted during Governance Review?

       A. Question and Answer

       B. Data Analysis

       C. Subjective Judgement

       D. All of these

Ans : All of these

Q.8 Which of the following SSA audit types involves simulating real-life attacker in the unprivileged and privileged modes?

       A. Process Audits

       B. Process Maturity Review

       C. Technical Review

Ans : Technical Review

Q.9 What is the output of Technical Review?

       A. Report with SWOT analysis

       B. SSA Maturity report

       C. Top strategic improvements

       D. Vulnerability report

Ans : Vulnerability report

Q.10 What is the output of Governance Review?

       A. Vulnerability report

       B. SSA Maturity report

       C. Top strategic improvements

       D. Report with SWOT analysis

Ans : Top strategic improvements

Q.11 Software that is secure on a given platform, environment, and threat landscape can be considered secure in any other platform, environment or threat landscape.

       A. True

       B. False

Ans : True

Q.12 How often are process audits carried out?

       A. Monthly

       B. With major releases

       B. Quarterly

Ans : Quarterly

Leave a Comment

Your email address will not be published. Required fields are marked *