Exam 3: Principles of Security and Quality
Exam 1: Why You Need to Learn Secure Programming45 Questions
Exam 2: Coding in the Sdlc: Not a Solitary Practice49 Questions
Exam 3: Principles of Security and Quality44 Questions
Exam 4: Getting Organized: What to Do on Day One41 Questions
Exam 5: Software Requirements: Hear What They Say, Know What They Mean, Protect What They Own43 Questions
Exam 6: Designing for Quality: the Big Picture47 Questions
Exam 7: Designing for Security45 Questions
Exam 8: Development Tools: Choose Wisely42 Questions
Exam 9: Coding in the Cube: Developing Good Habit50 Questions
Exam 10: Testing for Quality and Security45 Questions
Exam 11: Maintain Your Software, Maintain Your Career43 Questions
Select questions type
Defense in depth is designed on the principle that a single layer of protection from different vendors or software is sufficient.
Free
(True/False)
4.8/5
(40)
Correct Answer:
False
Complex code is better for the development team.
Free
(True/False)
4.8/5
(32)
Correct Answer:
False
ISO and IEEE have published many resources regarding quality software and the development processes that produce such software.
Free
(True/False)
4.9/5
(36)
Correct Answer:
True
What is attained when variable and method names are meaningful and when they represent the actual value they represent?
(Multiple Choice)
4.8/5
(49)
The foundation of software applications and the development processes that produce them are based on common best principles of quality code and secure code.
(True/False)
4.9/5
(45)
Working principles of security and quality in the code is also called what?
(Multiple Choice)
4.8/5
(42)
Complexity will never be a factor no matter how reusable or understandable the code is.
(True/False)
4.8/5
(46)
A design that requires one key to send and receive data is more secure than a design that allows access to the information with two keys.
(True/False)
4.8/5
(41)
A developer can write useful code that will allow unauthorized users to access the applications assets.
(True/False)
4.9/5
(37)
Which part of the application is most likely to be attacked first?
(Multiple Choice)
4.8/5
(34)
What is attained by keeping unauthorized users from accessing confidential information?
(Multiple Choice)
4.7/5
(37)
The goal of confidentiality is to ensure that no user other than the owner(s) can see or access the data.
(True/False)
5.0/5
(36)
Availability refers to the percentage of time a developer is available during scheduled hours of operation.
(True/False)
4.9/5
(35)
Readability and Credibility are two types of principles of security and quality.
(True/False)
4.9/5
(45)
Methodologies help the overall process by making everyday development activities predictable, continual, and most of all visible.
(True/False)
4.8/5
(42)
What industry standard lists characteristics of quality code?
(Multiple Choice)
4.8/5
(38)
What is attained when a developer creates code that can be run itself and uses parameters?
(Multiple Choice)
4.8/5
(41)
What is attained by keeping the data untouched from point of entry into the application to the point of exit?
(Multiple Choice)
4.9/5
(38)
"Fail Securely" is simply what happens when the system goes down.
(True/False)
4.9/5
(32)
Showing 1 - 20 of 44
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)