View Mode
Q: 15
HOTSPOT The Timebox to deliver the online reservation system through the Hoy Hall website has experienced a major issue. During Timebox C a test was completed to simulate an attack on the financial element of the online reservation system, with the intention of finding security weaknesses. It was found that it was potentially possible to gain access to the system, its functionality and data. Further work is therefore needed to meet the information security elements of a customer financial transaction. Answer the following question about the actions to be taken by each role. Column 1 describes a list of actions related to dealing with the security issue with the hotel reservation system. Column 2 lists the key roles. For each action in Column 1, select from Column 2 the role that should carry out the action. Each selection from Column 2 can be used once, more than once or not at all. Column 1 Advise how the legislation on the transfer of data will affect the requirements and the system. Agree the changes needed to the corporate technical architecture with the Architecture Angels IT support team. Ensure the information security vulnerability is communicated to the AA Head Office IT Director. Evaluate the impact of proposed security controls on the business and decide on the most suitable solution. Reprioritise the requirements on the Prioritised Requirements List associated with the security issue. Column 2 Project Manager Business Sponsor Business Visionary Technical Coordinator Business Analyst Team Leader Business Ambassador Solution Developer APMG International AGILEPM PRACTITIONER question APMG International AGILEPM PRACTITIONER question
Your Answer
Question 15 of 25

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE