Exam 3: Principles of Security and Quality
Exam 1: Why You Need to Learn Secure Programming45 Questions
Exam 2: Coding in the Sdlc: Not a Solitary Practice49 Questions
Exam 3: Principles of Security and Quality44 Questions
Exam 4: Getting Organized: What to Do on Day One41 Questions
Exam 5: Software Requirements: Hear What They Say, Know What They Mean, Protect What They Own43 Questions
Exam 6: Designing for Quality: the Big Picture47 Questions
Exam 7: Designing for Security45 Questions
Exam 8: Development Tools: Choose Wisely42 Questions
Exam 9: Coding in the Cube: Developing Good Habit50 Questions
Exam 10: Testing for Quality and Security45 Questions
Exam 11: Maintain Your Software, Maintain Your Career43 Questions
Select questions type
The principle of maintainability includes the tenet that the application is able to run itself.
(True/False)
4.9/5
(38)
Which principle tells the developer to code multiple layers of types of protection?
(Multiple Choice)
4.9/5
(46)
Which principle tells the developer to allow the user access to only what is need for that user's job?
(Multiple Choice)
4.9/5
(30)
What is attained by creating code that can change meaning on demand?
(Multiple Choice)
4.9/5
(35)
What is attained by creating code that can be easily modified without affecting the application as a whole?
(Multiple Choice)
4.8/5
(33)
The Information Systems Security Association's (ISSA) main purpose is to promote practices that will ensure the confidentiality, integrity and availability of organizational information resources.
(True/False)
4.7/5
(31)
CONSTANTS are values that are changeable within a programming language.
(True/False)
4.8/5
(28)
What is attained by giving the user community training resources, help guides, and user manuals?
(Multiple Choice)
4.7/5
(42)
Quality code means writing software for an intended purpose that must work when needed.
(True/False)
4.8/5
(28)
What principle might tell the developer to create one server that creates security keys and another server that stores the keys?
(Multiple Choice)
4.7/5
(40)
The principle of Least Privilege states that you should give users the least amount of privilege required to perform their use case functionality.
(True/False)
4.8/5
(36)
What is attained by keeping an application operative when needed?
(Multiple Choice)
4.7/5
(39)
If complexity can neither be removed nor automated, it should be what?
(Multiple Choice)
4.8/5
(43)
Authentication ensures that the user has the appropriate role and privilege to view data.
(True/False)
4.9/5
(37)
The goal of SWEBOK is to define a clear set of boundaries and materials that make up software development from an engineering perspective.
(True/False)
4.8/5
(31)
The integrity of the application is defined by the way in which the application accepts, transmits and stores data.
(True/False)
4.9/5
(35)
Secure code does not allow who to access the software's assets?
(Multiple Choice)
4.8/5
(33)
An asset is a valued resource that the application has to protect.
(True/False)
4.9/5
(45)
Showing 21 - 40 of 44
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)