Exam 10: Testing for Quality and Security
Exam 1: Why You Need to Learn Secure Programming45 Questions
Exam 2: Coding in the Sdlc: Not a Solitary Practice49 Questions
Exam 3: Principles of Security and Quality44 Questions
Exam 4: Getting Organized: What to Do on Day One41 Questions
Exam 5: Software Requirements: Hear What They Say, Know What They Mean, Protect What They Own43 Questions
Exam 6: Designing for Quality: the Big Picture47 Questions
Exam 7: Designing for Security45 Questions
Exam 8: Development Tools: Choose Wisely42 Questions
Exam 9: Coding in the Cube: Developing Good Habit50 Questions
Exam 10: Testing for Quality and Security45 Questions
Exam 11: Maintain Your Software, Maintain Your Career43 Questions
Select questions type
What is a technique that feeds random input data into applications just to see what happens to the results?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
D
What tool scans (parse) through static code and analyze the code base for security vulnerabilities
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
A
Penetrations testing is a very rare practice in the security field.
(True/False)
4.9/5
(43)
Coding for resiliency means accepting the fact that something bad will happen and that when it does, you will be ready.
(True/False)
4.8/5
(34)
What are step-by-step instructions that depict a specific scenario or situation that the use case will encounter as well as the expected result?
(Multiple Choice)
5.0/5
(33)
Code review needs to include the developer who coded the software and one other person on the development team.
(True/False)
4.9/5
(41)
Internal threats don't pose any real problems and do not need to be considered.
(True/False)
4.8/5
(36)
Fuzz testing and reliability testing are conducted during system testing.
(True/False)
4.9/5
(36)
Reliability of an application is when the application produces correct results despite being under attack or under extreme use.
(True/False)
4.8/5
(28)
There are two types of resourcres needed to execute the test case: -Internal -External
(True/False)
4.9/5
(33)
What are people-intensive verification techniques that are conducted either formally or informally that allow peers to read code statements and look for common security vulnerabilities, such as hard-coded IDs or passwords,and general quality features?
(Multiple Choice)
4.9/5
(38)
The testing phase of any applications is only a minor phase of the lifecycle.
(True/False)
4.8/5
(35)
Code reviews, if conducted right can have a very positive effect on the team.
(True/False)
4.7/5
(35)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)