Exam 5: Software Requirements: Hear What They Say, Know What They Mean, Protect What They Own
Exam 1: Why You Need to Learn Secure Programming45 Questions
Exam 2: Coding in the Sdlc: Not a Solitary Practice49 Questions
Exam 3: Principles of Security and Quality44 Questions
Exam 4: Getting Organized: What to Do on Day One41 Questions
Exam 5: Software Requirements: Hear What They Say, Know What They Mean, Protect What They Own43 Questions
Exam 6: Designing for Quality: the Big Picture47 Questions
Exam 7: Designing for Security45 Questions
Exam 8: Development Tools: Choose Wisely42 Questions
Exam 9: Coding in the Cube: Developing Good Habit50 Questions
Exam 10: Testing for Quality and Security45 Questions
Exam 11: Maintain Your Software, Maintain Your Career43 Questions
Select questions type
When requirements begin to creep in from all angles without any further analysis, this is called scope creep.
(True/False)
4.8/5
(38)
The honest, open-ended approach is too vague of an approach to begin the communication process.
(True/False)
4.7/5
(40)
There should be a dependent relationship between the developer and analyst that ensures that both individuals have done their jobs.
(True/False)
4.8/5
(33)
Misuse cases are similar to use cases only they are the opposite.
(True/False)
4.7/5
(39)
The needs statement provides the main mission or purpose of the application.
(True/False)
4.9/5
(43)
Visualization is very powerful and it will certainly help your overall understanding of the requirements.
(True/False)
4.8/5
(35)
Only the project manager has the responsibility of identifying assets.
(True/False)
4.9/5
(35)
Knowing the enemy preconditions will help the management team determine if the cost of developing countermeasures overrides the risk of taking a chance.
(True/False)
4.8/5
(32)
The relationship between use case documentation and its counterpart misuse case are independent of each other.
(True/False)
4.9/5
(35)
C.I.A. stands for confidentiality, integrity, and accountability.
(True/False)
4.9/5
(45)
Catching software requirements errors at the beginning of the development process is very costly.
(True/False)
4.8/5
(34)
The first step in devising a misuse case is putting a face to your enemy.
(True/False)
5.0/5
(39)
When listing attack types, don't let everyone on the team contribute options.
(True/False)
4.8/5
(36)
Who is responsible for helping in the identification of assets?
(Multiple Choice)
4.7/5
(39)
Showing 21 - 40 of 43
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)