Exam 11: Maintain Your Software, Maintain Your Career
Exam 1: Why You Need to Learn Secure Programming45 Questions
Exam 2: Coding in the Sdlc: Not a Solitary Practice49 Questions
Exam 3: Principles of Security and Quality44 Questions
Exam 4: Getting Organized: What to Do on Day One41 Questions
Exam 5: Software Requirements: Hear What They Say, Know What They Mean, Protect What They Own43 Questions
Exam 6: Designing for Quality: the Big Picture47 Questions
Exam 7: Designing for Security45 Questions
Exam 8: Development Tools: Choose Wisely42 Questions
Exam 9: Coding in the Cube: Developing Good Habit50 Questions
Exam 10: Testing for Quality and Security45 Questions
Exam 11: Maintain Your Software, Maintain Your Career43 Questions
Select questions type
Podcasts are online videos that can be used for training, instructions, or demonstrations.
Free
(True/False)
4.9/5
(36)
Correct Answer:
False
Bypassing the CCB process gives the developer more time to guard against security vulnerabilities in the application.
Free
(True/False)
4.9/5
(46)
Correct Answer:
False
Once the project is in maintenance mode, the developer can relax a little with the details of the requirement process.
Free
(True/False)
4.8/5
(36)
Correct Answer:
False
What is the best way project management can ensure change requests (CR) are appropriately managed?
(Multiple Choice)
4.8/5
(46)
According to the Organization for Internet Safety (OIS), which of the following steps for a threat response process does the organization verify the attack?
(Multiple Choice)
4.8/5
(40)
The Applications Guide doesn't need rules in place to be successful.
(True/False)
4.9/5
(35)
The duty of responding to attacks is to maintain the security integrity of the software throughout its useful lifetime.
(True/False)
4.8/5
(40)
In order to support the application's operations, everyone on the team must sustain secure software until the application retires.
(True/False)
4.9/5
(41)
Learning new technologies and networking with your peers are two ways to show initiative.
(True/False)
4.9/5
(33)
The developer can help sustain the formaility in the development process during maintenance by creating a change control board.
(True/False)
4.8/5
(38)
Monitoring error logs and responding to immediate issues is a great way to stay proactive in the secure software process.
(True/False)
4.9/5
(35)
Reactive measures are plans and polices that outline the proper response to an incident.
(True/False)
4.9/5
(36)
Wikis are online resources that can be used to define common elements of the application, department or company.
(True/False)
4.8/5
(40)
A managerial policy is not necessary to include in the Application Guide.
(True/False)
4.9/5
(40)
Why are new developers somewhat of a risk to the security of the software?
(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 43
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)