Filters
Question type

Study Flashcards

_______________,historically,has not been an integral part of the software development life cycle.

Correct Answer

verifed

verified

Determining what needs to be accessed,and the appropriate level of permission for every item accessed is an example of what principle?


A) Least functionality
B) Least privilege
C) Least access
D) Least rights

Correct Answer

verifed

verified

Generating true random numbers is a fairly trivial task.

Correct Answer

verifed

verified

Which type of error occurs when a program executes the error checking routine,prior to manipulating strings to a base form?


A) Canonicalization error
B) Improper output handling
C) Injection
D) Buffer overflow

Correct Answer

verifed

verified

A

Proper use of _______________ can provide a wealth of programmatic functionality,such as authentication,confidentiality,integrity,and nonrepudiation.

Correct Answer

verifed

verified

You are interviewing for a job as a software developer.The interviewer asks you to explain good software development practices.

Correct Answer

verifed

verified

Early testing helps resolve errors at an...

View Answer

What is used to compare program responses to known inputs and comparison of the output to desired output?


A) Use cases
B) Waterfall models
C) Requirements testing
D) Good practices

Correct Answer

verifed

verified

The specific security needs of a program being developed should be defined in the design phase of the secure development lifecycle.

Correct Answer

verifed

verified

_______________ is the systematic application of a series of malformed inputs to test how the program responds.

Correct Answer

verifed

verified

In the secure development lifecycle,how must the specific security needs of software being developed be defined?


A) Coding phase
B) Design phase
C) Requirements phase
D) Testing phase

Correct Answer

verifed

verified

C

The spiral model is characterized by iterative development,where requirements and solutions evolve through an ongoing collaboration between self-organizing,cross-functional teams.

Correct Answer

verifed

verified

Which is related to a code injection error?


A) VB.NET
B) SQL
C) JavaScript
D) C#

Correct Answer

verifed

verified

When the function of code is changed in an unintended way,it is an example of code injection.

Correct Answer

verifed

verified

In the secure development lifecycle,in which phase should minimizing the attack surface area take place?


A) Coding phase
B) Design phase
C) Requirements phase
D) Testing phase

Correct Answer

verifed

verified

Cryptography is the solution to all security problems.

Correct Answer

verifed

verified

What are the phases of the software development lifecycle?

Correct Answer

verifed

verified

Requiremen...

View Answer

How can secure coding be incorporated into the software development process?

Correct Answer

verifed

verified

The requirements phase is the most impor...

View Answer

In the secure development lifecycle,employing use cases to compare program responses to known inputs,and then comparing the outputs to the desired outputs should take place in which phase?


A) Coding phase
B) Design phase
C) Requirements phase
D) Testing phase

Correct Answer

verifed

verified

What are the major types of coding errors and their root cause?

Correct Answer

verifed

verified

The most common coding error is a buffer...

View Answer

The _______________ model is characterized by a multistep process in which the steps follow each other in a linear,one-way fashion,like water over a waterfall

Correct Answer

verifed

verified

waterfall

Showing 1 - 20 of 40

Related Exams

Show Answer