100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

D487 - SECURE SOFTWARE DESIGN KNOWLEGE CHECK AND QUIZ

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
30-05-2025
Written in
2024/2025

D487 - SECURE SOFTWARE DESIGN KNOWLEGE CHECK AND QUIZ

Institution
D487
Course
D487









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
D487
Course
D487

Document information

Uploaded on
May 30, 2025
Number of pages
6
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

D487 - SECURE SOFTWARE DESIGN KNOWLEGE
CHECK AND QUIZ



What are the two common best principles of software applications in the development
process? - Answers :Quality Code & Secure Code

What ensures that the user has the appropriate role and privilege to view data? -
Answers :Authorization

Which security goal is defined by "guarding against improper information modification or
destruction and ensuring information non-repudiation and authenticity"? - Answers
:Integrity

Which phase in an SDLC helps to define the problem and scope of any existing
systems and determine the objectives of new systems? - Answers :Planning

What happens during a dynamic code review? - Answers :Programmers monitor system
memory, functional behavior, response times, and overall performance.

How should you store your application user credentials in your application database? -
Answers :Store credentials using salted hashes

Which software methodology resembles an assembly-line approach? - Answers
:Waterfall model

Which software methodology approach provides faster time to market and higher
business value? - Answers :Agile model

In Scrum methodology, who is responsible for making decisions on the requirements? -
Answers :Product Owner

What is the product risk profile? - Answers :A security assessment deliverable that
estimates the actual cost of the product

A software security team member has been tasked with creating a deliverable that
provides details on where and to what degree sensitive customer information is
collected, stored, or created within a new product offering.

What does the team member need to deliver in order to meet the objective? - Answers
:Privacy impact assessment

, A software security team member has been tasked with creating a threat model for the
login process of a new product.What is the first step the team member should take? -
Answers :Identify security objectives

What are three parts of the STRIDE methodology? - Answers :Spoofing, Elevation,
Tampering

What is the reason software security teams host discovery meetings with stakeholders
early in the development life cycle? - Answers :To ensure that security is built into the
product from the start

Why should a security team provide documented certification requirements during the
software assessment phase? - Answers :Depending on the environment in which the
product resides, certifications may be required by corporate or government entities
before the software can be released to customers.

What are two items that should be included in the privacy impact assessment plan
regardless of which methodology is used? - Answers :Required process steps &
Technologies and techniques

What are the goals of each SDL deliverable? - Product Risk Profile - Answers :Estimate
the actual cost of the product

What are the goals of each SDL deliverable? -SDL project outline - Answers :Map
security activities to the development schedule

What are the goals of each SDL deliverable? - Threat profile - Answers :Guide security
activities to protect the product from vulnerabilities

What are the goals of each SDL deliverable? -List of third-party software - Answers
:Identify the dependence on unmanaged software

What is a threat action that is designed to illegally access and use another person's
credentials? - Answers :Spoofing

What are two steps of the threat modeling process? - Answers :Survey The application
& Decompose the application

What do the "A" and the first "D" in the DREAD acronym represent? - Answers :Damage
& Affected Users

Which shape indicates each type of flow diagram element? - External elements -
Answers :Rectangle

Which shape indicates each type of flow diagram element? - Data Store - Answers :Two
Parallel horizontal lines

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GEEKA YALA UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
2011
Member since
3 year
Number of followers
1447
Documents
48584
Last sold
5 hours ago

3.8

345 reviews

5
172
4
61
3
44
2
16
1
52

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions