During the deployment of a new system, the implementation team determines that APIs used to integrate the new system with a legacy system are not functioning properly.
Further investigation shows there is a misconfigured encryption algorithm used to secure data transfers between systems.
Which of the following should the project manager use to determine the source of the defined algorithm in use?
Click on the arrows to vote for the correct answer
A. B. C. D. E.E.
The project manager in this scenario is facing an issue where APIs used to integrate a new system with a legacy system are not functioning properly, and the root cause of the problem has been identified as a misconfigured encryption algorithm used to secure data transfers between systems. In order to determine the source of the defined algorithm in use, the project manager has to review the relevant documentation and resources.
Out of the options provided, the best approach for the project manager to determine the source of the defined algorithm in use would be to review the code repositories. This is because the code repositories are the most likely place to find the specific code related to the encryption algorithm in use. By reviewing the code repositories, the project manager can identify the specific code that is responsible for the encryption algorithm used to secure data transfers between systems and identify any misconfigurations or issues with it.
The security requirements traceability matrix is a document that traces the relationship between security requirements and the system components that satisfy those requirements. While this document may be helpful in identifying the security requirements for the system, it is not likely to provide the specific details needed to identify the source of the encryption algorithm in use.
The software development lifecycle is a process used to design, develop, test, and deploy software systems. While this process may provide some insight into the development of the encryption algorithm, it is not likely to provide the specific details needed to identify the source of the algorithm in use.
The roles matrix is a document that identifies the specific roles and responsibilities of team members involved in the project. While this document may be helpful in identifying who is responsible for the encryption algorithm, it is not likely to provide the specific details needed to identify the source of the algorithm in use.
Finally, the implementation guide is a document that provides instructions on how to install, configure, and deploy the system. While this document may provide some information about the encryption algorithm used, it is not likely to provide the specific details needed to identify the source of the algorithm in use.
In summary, the project manager should review the code repositories to determine the source of the defined algorithm in use.