Exam 3: Principles of Security and Quality

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The principle of maintainability includes the tenet that the application is able to run itself.

(True/False)
4.9/5
(38)

Which principle tells the developer to code multiple layers of types of protection?

(Multiple Choice)
4.9/5
(46)

Which principle tells the developer to allow the user access to only what is need for that user's job?

(Multiple Choice)
4.9/5
(30)

What is attained by creating code that can change meaning on demand?

(Multiple Choice)
4.9/5
(35)

What is attained by creating code that can be easily modified without affecting the application as a whole?

(Multiple Choice)
4.8/5
(33)

The Information Systems Security Association's (ISSA) main purpose is to promote practices that will ensure the confidentiality, integrity and availability of organizational information resources.

(True/False)
4.7/5
(31)

CONSTANTS are values that are changeable within a programming language.

(True/False)
4.8/5
(28)

What is attained by giving the user community training resources, help guides, and user manuals?

(Multiple Choice)
4.7/5
(42)

Why is software quality an art form?

(Multiple Choice)
4.8/5
(29)

Quality code means writing software for an intended purpose that must work when needed.

(True/False)
4.8/5
(28)

What principle might tell the developer to create one server that creates security keys and another server that stores the keys?

(Multiple Choice)
4.7/5
(40)

The principle of Least Privilege states that you should give users the least amount of privilege required to perform their use case functionality.

(True/False)
4.8/5
(36)

What is attained by keeping an application operative when needed?

(Multiple Choice)
4.7/5
(39)

If complexity can neither be removed nor automated, it should be what?

(Multiple Choice)
4.8/5
(43)

Authentication ensures that the user has the appropriate role and privilege to view data.

(True/False)
4.9/5
(37)

The goal of SWEBOK is to define a clear set of boundaries and materials that make up software development from an engineering perspective.

(True/False)
4.8/5
(31)

The integrity of the application is defined by the way in which the application accepts, transmits and stores data.

(True/False)
4.9/5
(35)

Secure code does not allow who to access the software's assets?

(Multiple Choice)
4.8/5
(33)

How can a developer fight back from software attacks?

(Multiple Choice)
4.9/5
(41)

An asset is a valued resource that the application has to protect.

(True/False)
4.9/5
(45)
Showing 21 - 40 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)