Exam 3: Principles of Security and Quality

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Defense in depth is designed on the principle that a single layer of protection from different vendors or software is sufficient.

Free
(True/False)
4.8/5
(40)
Correct Answer:
Verified

False

Complex code is better for the development team.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

False

ISO and IEEE have published many resources regarding quality software and the development processes that produce such software.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

True

What is attained when variable and method names are meaningful and when they represent the actual value they represent?

(Multiple Choice)
4.8/5
(49)

The foundation of software applications and the development processes that produce them are based on common best principles of quality code and secure code.

(True/False)
4.9/5
(45)

Working principles of security and quality in the code is also called what?

(Multiple Choice)
4.8/5
(42)

Complexity will never be a factor no matter how reusable or understandable the code is.

(True/False)
4.8/5
(46)

A design that requires one key to send and receive data is more secure than a design that allows access to the information with two keys.

(True/False)
4.8/5
(41)

It's possible to have quality without security.

(True/False)
4.7/5
(42)

A developer can write useful code that will allow unauthorized users to access the applications assets.

(True/False)
4.9/5
(37)

Which part of the application is most likely to be attacked first?

(Multiple Choice)
4.8/5
(34)

What is attained by keeping unauthorized users from accessing confidential information?

(Multiple Choice)
4.7/5
(37)

The goal of confidentiality is to ensure that no user other than the owner(s) can see or access the data.

(True/False)
5.0/5
(36)

Availability refers to the percentage of time a developer is available during scheduled hours of operation.

(True/False)
4.9/5
(35)

Readability and Credibility are two types of principles of security and quality.

(True/False)
4.9/5
(45)

Methodologies help the overall process by making everyday development activities predictable, continual, and most of all visible.

(True/False)
4.8/5
(42)

What industry standard lists characteristics of quality code?

(Multiple Choice)
4.8/5
(38)

What is attained when a developer creates code that can be run itself and uses parameters?

(Multiple Choice)
4.8/5
(41)

What is attained by keeping the data untouched from point of entry into the application to the point of exit?

(Multiple Choice)
4.9/5
(38)

"Fail Securely" is simply what happens when the system goes down.

(True/False)
4.9/5
(32)
Showing 1 - 20 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)