Exam 9: Coding in the Cube: Developing Good Habit
Exam 1: Why You Need to Learn Secure Programming45 Questions
Exam 2: Coding in the Sdlc: Not a Solitary Practice49 Questions
Exam 3: Principles of Security and Quality44 Questions
Exam 4: Getting Organized: What to Do on Day One41 Questions
Exam 5: Software Requirements: Hear What They Say, Know What They Mean, Protect What They Own43 Questions
Exam 6: Designing for Quality: the Big Picture47 Questions
Exam 7: Designing for Security45 Questions
Exam 8: Development Tools: Choose Wisely42 Questions
Exam 9: Coding in the Cube: Developing Good Habit50 Questions
Exam 10: Testing for Quality and Security45 Questions
Exam 11: Maintain Your Software, Maintain Your Career43 Questions
Select questions type
How should a developer code for DEBUGS?
Free
(Multiple Choice)
4.8/5
(44)
Correct Answer:
B
After the debug methods are built into the program, they can be called anywhere at anytime within the program you need to test.
Free
(True/False)
4.9/5
(38)
Correct Answer:
True
Where do most attacks to software come from?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
B
Open source code is greatly discouraged within the software community.
(True/False)
4.9/5
(33)
Application errors expose a lot of information about the code and its environment.
(True/False)
4.8/5
(35)
What is the grouping and storing of data inside a single object?
(Multiple Choice)
4.8/5
(38)
Which of the following steps are NOT needed to for exception handling?
(Multiple Choice)
4.8/5
(44)
What is the best way to turn off DEBUG statements in the code?
(Multiple Choice)
4.8/5
(37)
Which item is NOT a characteristic of self-monitoring code?
(Multiple Choice)
4.9/5
(32)
What is it called when software is developed on the premise that specifications, data, and environments will change?
(Multiple Choice)
4.8/5
(46)
The most notable security flaw with the C/C++ language is the buffer overflow attack.
(True/False)
4.7/5
(42)
What type of software looks up values stored in a database and determines what to display, allow, or execute based on those values
(Multiple Choice)
4.8/5
(32)
Code refactoring occurs when existing bodies of logic are broken up and moved into many smaller bodies of code.
(True/False)
4.9/5
(42)
You do not have to cancel a user's ID or password if they exceed a specified threshold of login times.
(True/False)
4.7/5
(34)
Logging user traffic, events and data flow is one of the best analysis techniques you can do for an application.
(True/False)
4.8/5
(42)
Use singleton objects when a common object or task will be used across multiple use cases for the same reason.
(True/False)
4.9/5
(44)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)