Secure Software Design v1.0

Page:    1 / 5   
Exam contains 66 questions

What sits between a browser and an internet connection and alters requests and responses in a way the developer did not intend?

  • A. Load testing
  • B. Input validation
  • C. Intercept proxy
  • D. Reverse engineering


Answer : C

Which secure coding best practice says to use a single application-level authorization component that will lock down the application if it cannot access its configuration information?

  • A. Access control
  • B. Data protection
  • C. Session management
  • D. Communication security


Answer : A

Which mitigation technique can be used to tight against a threat where a user may gain access to administrator level functionality?

  • A. Encryption
  • B. Quality of service
  • C. Hashes
  • D. Run with least privilege


Answer : D

Which privacy impact statement requirement type defines processes to keep personal information updated and accurate?

  • A. Access requirements
  • B. Collection of personal information requirements
  • C. Data integrity requirements
  • D. Personal information retention requirements


Answer : C

The software security team prepared a detailed schedule mapping security development lifecycle phases to the type of analysis they will execute.
Which design and development deliverable did the team prepare?

  • A. Design security review
  • B. Updated threat modeling artifacts
  • C. Privacy implementation assessment results
  • D. Security test plans


Answer : D

Which type of security analysis is limited by the fact that a significant time investment of a highly skilled team member is required?

  • A. Fuzz testing
  • B. Dynamic code analysis
  • C. Manual code review
  • D. Static code analysis


Answer : C

A potential threat was discovered during automated system testing when a PATCH request sent to the API caused an unhandled server exception. The API only supports GET, POST, PUT, and DELETE requests.
How should existing security controls be adjusted to prevent this in the future?

  • A. Properly configure acceptable API requests
  • B. Enforce role-based authorization
  • C. Use API keys to enforce authorization of every request
  • D. Ensure audit logs are in place for sensitive transactions


Answer : A

Recent vulnerability scans discovered that the organization’s production web servers were responding to ping requests with server type, version, and operating system, which hackers could leverage to plan attacks.
How should the organization remediate this vulnerability?

  • A. Ensure servers are configured to return as little information as possible to network requests
  • B. Ensure servers are regularly updated with the latest security patches
  • C. Always uninstall or disable features that are not required
  • D. Access to configuration files is limited to administrators


Answer : A

Which security assessment deliverable identifies unmanaged code that must be kept up to date throughout the life of the product?

  • A. Threat profile
  • B. Metrics template
  • C. Product risk profile
  • D. List of third-party software


Answer : D

Credit card numbers are encrypted when stored in the database but are automatically decrypted when data is fetched. The testing tool intercepted the GET response, and testers were able to view credit card numbers as clear text.
How should the organization remediate this vulnerability?

  • A. Never cache sensitive data
  • B. Ensure there is an audit trail for all sensitive transactions
  • C. Ensure all data in transit is encrypted
  • D. Enforce role-based authorization controls in all application layers


Answer : C

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company’s claims intake component. The base score of the vulnerability was 3.5 and changed to 5.9 after adjusting temporal and environmental metrics.
Which rating would CVSS assign this vulnerability?

  • A. Critical severity
  • B. High severity
  • C. Low severity
  • D. Medium severity


Answer : D

Which software-testing technique can be automated or semi-automated and provides invalid, unexpected, or random data to the inputs of a computer software program?

  • A. Fuzzing
  • B. Static analysis
  • C. Dynamic analysis
  • D. Bugtraq


Answer : A

While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not log out of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.
How should existing security controls be adjusted to prevent this in the future?

  • A. Ensure no sensitive information is stored in plain text in cookies
  • B. Ensure user sessions timeout after short intervals
  • C. Ensure role-based access control is enforced for access to all resources
  • D. Ensure strong password policies are enforced


Answer : B

Company leadership has discovered an untapped revenue stream within its customer base and wants to meet with IT to share its vision for the future and determine whether to move forward.
Which phase of the software development lifecycle (SDLC) is being described?

  • A. Implementation
  • B. Design
  • C. Planning
  • D. Requirements


Answer : C

Which SDL security goal is defined as ensuring timely and reliable access to and use of information?

  • A. Information security
  • B. Confidentiality
  • C. Availability
  • D. Integrity


Answer : C

Page:    1 / 5   
Exam contains 66 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy | Amazon Exams | Cisco Exams | CompTIA Exams | Databricks Exams | Fortinet Exams | Google Exams | Microsoft Exams | VMware Exams