Exam 11: Maintain Your Software, Maintain Your Career

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Podcasts are online videos that can be used for training, instructions, or demonstrations.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

False

Bypassing the CCB process gives the developer more time to guard against security vulnerabilities in the application.

Free
(True/False)
4.9/5
(46)
Correct Answer:
Verified

False

Once the project is in maintenance mode, the developer can relax a little with the details of the requirement process.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

False

What is the best way project management can ensure change requests (CR) are appropriately managed?

(Multiple Choice)
4.8/5
(46)

Sensing activities does not help the code protect itself.

(True/False)
4.7/5
(40)

According to the Organization for Internet Safety (OIS), which of the following steps for a threat response process does the organization verify the attack?

(Multiple Choice)
4.8/5
(40)

The Applications Guide doesn't need rules in place to be successful.

(True/False)
4.9/5
(35)

The duty of responding to attacks is to maintain the security integrity of the software throughout its useful lifetime.

(True/False)
4.8/5
(40)

Ajax does not have any security vulnerabilities.

(True/False)
4.9/5
(32)

How can one scout for incidents?

(Multiple Choice)
4.9/5
(40)

In order to support the application's operations, everyone on the team must sustain secure software until the application retires.

(True/False)
4.9/5
(41)

Learning new technologies and networking with your peers are two ways to show initiative.

(True/False)
4.9/5
(33)

The developer can help sustain the formaility in the development process during maintenance by creating a change control board.

(True/False)
4.8/5
(38)

Monitoring error logs and responding to immediate issues is a great way to stay proactive in the secure software process.

(True/False)
4.9/5
(35)

Reactive measures are plans and polices that outline the proper response to an incident.

(True/False)
4.9/5
(36)

What do sensing activities include?

(Multiple Choice)
4.9/5
(39)

Wikis are online resources that can be used to define common elements of the application, department or company.

(True/False)
4.8/5
(40)

A managerial policy is not necessary to include in the Application Guide.

(True/False)
4.9/5
(40)

Software assurance means that your code is secure.

(True/False)
4.9/5
(39)

Why are new developers somewhat of a risk to the security of the software?

(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 43
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)