Exam 18: Secure Software Development

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The _______________ is the first step in a software development process model.

(Short Answer)
4.8/5
(43)

Errors found after development is complete are expensive.

(True/False)
4.8/5
(21)

Canonicalization vulnerabilities are restricted to Windows systems.

(True/False)
4.8/5
(25)

What does the term spiral method refer to?

(Multiple Choice)
4.8/5
(29)

_______________ is the conversion of a name to its simplest form.

(Short Answer)
4.9/5
(37)

Fuzzing is a powerful tool used in testing code.

(True/False)
4.9/5
(43)

What is the one item that could labeled as the "most wanted" item in coding security?

(Multiple Choice)
4.8/5
(32)

How does implementing a good software development process enforce security inclusion in a project?

(Essay)
4.8/5
(33)

Testing is not an essential part of the generation of secure code.

(True/False)
4.7/5
(28)

Unvalidated input that changes the code functioning in an unintended way is which type of coding error?

(Multiple Choice)
4.8/5
(35)

Scoring the efforts to reduce the effects of threats occurs in which step of threat modeling?

(Multiple Choice)
4.9/5
(43)

Lease privilege refers to removing all controls from a system.

(True/False)
4.8/5
(36)

Creating a graphical representation of the required elements for an attack vector occurs in which step of Threat Modeling?

(Multiple Choice)
4.8/5
(35)

If the requirement phase marks the beginning of the generation of security in code,then the _______________ marks the other boundary.

(Short Answer)
4.9/5
(33)

What is the waterfall model characterized by?

(Multiple Choice)
4.9/5
(37)

A(n)_______________ attack is a form of code injection aimed at any Structured Query Language (SQL)-based database,regardless of vendor.

(Short Answer)
4.9/5
(34)

What technique can be used to find potentially exploitable buffer overflows,without any specific knowledge of the coding?

(Multiple Choice)
4.8/5
(35)

The _______________ model is characterized by iterative development,where requirements and solutions evolve through an ongoing collaboration of self-organizing cross-functioning teams.

(Short Answer)
4.9/5
(32)

Which type of attack is used especially against databases?

(Multiple Choice)
4.8/5
(24)

Employing _______________ to compare program responses to known inputs and then comparing the output to the desired output is a proven method of testing software.

(Short Answer)
4.9/5
(25)
Showing 21 - 40 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)