EXAM 2025 BEYOND 300 REVISION
QUESTIONS AND THEIR CORRECT
ANSWERS READY FOR GRADE A +
1. abstract syntax tree - Answer GOOGLE
2. active scanner - Answer Modifies the HTTPS inputs and analyzes the
response to identify vulnerabilities
3. Agile methodology - Answer Opposite of waterfall, is good for iterative
releases with customer feedback.
4. alpha level testing - Answer Testing done by developer
5. application decomposition - Answer Determines the fundamental functions
of an application
6. application security - Answer Creating, testing, and implementing security
features to prevent vulnerabilities in applications
7. application-centric threat modeling - Answer Threat models that start with
the application being built
,8. Architecture (A2) phase - Answer Second phase of SDLC, examines security
from a business risk perspective
9. asset-centric threat modeling - Answer Threat models that start with
protecting assets and senior management.
10.authenticated scans - Answer A scan with credentials
11.Benchmarks - Answer A set of parameters checked against something.
12.beta level testing - Answer Testing done by user
13.black box testing - Answer Testing done from external source with no
knowledge of software
14.Building Security In Maturing Model (BSIMM) - Answer GOOGLE
15.code review - Answer A process done to identify security vulnerabilities in
code during SDLC
16.Common Vulnerabilities and Exposures (CVE) - Answer Tracking ID for
vulnerabilities
17.Common Vulnerability Scoring System (CVSS) - Answer Scoring system
for vulnerabilities
,18.control flow analysis - Answer GOOGLE
19.data flow diagrams - Answer How data flows through a application
20.deployment phase - Answer SLDC phase where security is deployed
21.Design and Development (A3) phase - Answer Third phase in SDLC,
analyze and test software to determine security and privacy issues
22.design phase - Answer SLDC phase where requirements are outlined for
technical design
23.DREAD - Answer Risk modeling approach, stands for Damage,
Reproducabilty, Exploitablity, Affected Users, and Discoverability
24.dynamic analysis - Answer Analyzing code as it is running in real time
25.elevation of privilege - Answer Exploiting vulnerabilities to upgrade account
privileges on a system
26.end of life phase - Answer When software is no longer receiving security
and stability updates
27.external resources - Answer Resources hired on a temporary basis
, 28.functional requirements - Answer Describes what the system will do/it's
purpose
29.functional testing scripts - Answer Instructions for a specific scenario or
situation
30.fuzz testing - Answer Throwing random data at a software input to test for
errors and vulnerabilities
31.gray box testing - Answer GOOGLE
32.hardware - Answer Physical devices
33.information disclosure - Answer Reading a file that one was not granted
access to
34.internal resources - Answer Resources within the company
35.internal scans - Answer Scans to identify what vulnerabilities could be
exploited when inside the network
36.intrusive target search - Answer Scans that exploit a vulnerability when
identified
37.maintenance phase - Answer SLDC phase where ongoing security
monitoring is implemented