Exam 18: Secure Software Development
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
The _______________ is the first step in a software development process model.
(Short Answer)
4.8/5
(43)
Canonicalization vulnerabilities are restricted to Windows systems.
(True/False)
4.8/5
(25)
_______________ is the conversion of a name to its simplest form.
(Short Answer)
4.9/5
(37)
What is the one item that could labeled as the "most wanted" item in coding security?
(Multiple Choice)
4.8/5
(32)
How does implementing a good software development process enforce security inclusion in a project?
(Essay)
4.8/5
(33)
Testing is not an essential part of the generation of secure code.
(True/False)
4.7/5
(28)
Unvalidated input that changes the code functioning in an unintended way is which type of coding error?
(Multiple Choice)
4.8/5
(35)
Scoring the efforts to reduce the effects of threats occurs in which step of threat modeling?
(Multiple Choice)
4.9/5
(43)
Creating a graphical representation of the required elements for an attack vector occurs in which step of Threat Modeling?
(Multiple Choice)
4.8/5
(35)
If the requirement phase marks the beginning of the generation of security in code,then the _______________ marks the other boundary.
(Short Answer)
4.9/5
(33)
A(n)_______________ attack is a form of code injection aimed at any Structured Query Language (SQL)-based database,regardless of vendor.
(Short Answer)
4.9/5
(34)
What technique can be used to find potentially exploitable buffer overflows,without any specific knowledge of the coding?
(Multiple Choice)
4.8/5
(35)
The _______________ model is characterized by iterative development,where requirements and solutions evolve through an ongoing collaboration of self-organizing cross-functioning teams.
(Short Answer)
4.9/5
(32)
Employing _______________ to compare program responses to known inputs and then comparing the output to the desired output is a proven method of testing software.
(Short Answer)
4.9/5
(25)
Showing 21 - 40 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)