Exam 1: Why You Need to Learn Secure Programming
Exam 1: Why You Need to Learn Secure Programming45 Questions
Exam 2: Coding in the Sdlc: Not a Solitary Practice49 Questions
Exam 3: Principles of Security and Quality44 Questions
Exam 4: Getting Organized: What to Do on Day One41 Questions
Exam 5: Software Requirements: Hear What They Say, Know What They Mean, Protect What They Own43 Questions
Exam 6: Designing for Quality: the Big Picture47 Questions
Exam 7: Designing for Security45 Questions
Exam 8: Development Tools: Choose Wisely42 Questions
Exam 9: Coding in the Cube: Developing Good Habit50 Questions
Exam 10: Testing for Quality and Security45 Questions
Exam 11: Maintain Your Software, Maintain Your Career43 Questions
Select questions type
Which software artifact best describes the system's behavior under various conditions?
(Multiple Choice)
5.0/5
(45)
Listening to other people's conversation or looking at their computer's monitor are forms of social engineering.
(True/False)
4.8/5
(39)
Integrity assures the application will be reliable when authorized users need to use the application.
(True/False)
4.8/5
(46)
If a person has been developing code for 15 years, then that person should be pretty good at developing code.
(True/False)
4.8/5
(35)
A hidden program that will cause destruction at a given time or event is?
(Multiple Choice)
4.8/5
(31)
A single clever dishonest programmer can ruin an entire application's integrity.
(True/False)
4.8/5
(32)
Traceability is when a person can visually associate one use case requirement to design documentation and ultimately the code snippet.
(True/False)
4.8/5
(36)
Which of the following journals deal with information security?
(Multiple Choice)
4.8/5
(40)
What type of attack occurs when an attacker can bypass the application's security mechanism to access the application's resources?
(Multiple Choice)
4.8/5
(44)
A type of attack that embeds JavaScript functions into HTML data elements so that pages can be redirects to other Web sites without the user knowing.
(Multiple Choice)
4.9/5
(39)
SOX (Sarbanes and Oxley) helps the credit card industry by making sure all electronic transactions are compliant to a security standard.
(True/False)
5.0/5
(37)
Confidentiality assures that the application maintains complete data privacy.
(True/False)
4.8/5
(34)
It is possible to develop a completely secure application as long as quality and security are built into the development process.
(True/False)
4.9/5
(32)
Whose mission is to promote U.S. innovation by applying technology to enhance economic security?
(Multiple Choice)
4.9/5
(37)
Software hackers get paid for performance. Therefore, if your software can not be penetrated in 48 hours or less, the application is pretty safe.
(True/False)
4.9/5
(37)
The developer is the single most important influential person on the development team.
(True/False)
4.9/5
(36)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)