List of questions
Related questions
Question 37 - PSM II discussion
During the Sprint Review the Product Owner introduces the functionality that is likely to be done over the next Sprints. The Chief Security Officer reminds everyone that through the envisioned functionality, sensitive personal user data will be stored. This might be the subject of external security audits. He reminds everyone of important non-functional requirements with regards to security. These were not applicable and not considered previously What are two effective ways the Scrum Team can manage these high-security concerns?
(choose the best two answers)
A.
They are discussed, determined, and documented in parallel Sprints to not disturb the actual feature development Once analyzed, they should be applied to the work already done before further feature development can continue.
B.
The impact of these security concerns on past and future work needs to be determined before new Sprints can start. A list of security-related Product Backlog items needs to be passed on to the Product Owner before starting the next Sprint
C.
They are added to the Product Backlog and addressed throughout the next Sprints, combined with creating the business functionality in those Sprints, no matter how small that business functionality.
D.
During the Sprint Retrospective, the Scrum Team assesses how to add these expectations to the Definition of Done so every future Increment will live up to these requirements. If needed they can work with external specialists to better understand the requirements
E.
They should be managed by a separate specialist team in a parallel Sprint, so they can be specifically resolved through an improved application design without hindering functional development.
Your answer:
0 comments
Sorted by
Leave a comment first