Secure Software Design Pre-Assessment
Actual Questions with Verified Answers
|100% Correct| Graded A.
Question:
What is a list of information security vulnerabilities that aims to provide
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
names for publicly known problems??
i,- i,- i,- i,-
Answer:
Common computer vulnerabilities and exposures (CVE)
i,- i,- i,- i,- i,-
Question:
Which secure coding best practice uses well-tested, publicly available
i,- i,- i,- i,- i,- i,- i,- i,- i,-
algorithms to hide product data from unauthorized access??
i,- i,- i,- i,- i,- i,- i,-
Answer:
Cryptographic practices i,-
Question:
Which secure coding best practice uses well-tested, publicly available
i,- i,- i,- i,- i,- i,- i,- i,- i,-
algorithms to hide product data from unauthorized access??
i,- i,- i,- i,- i,- i,- i,-
,Answer:
Cryptographic practices i,-
Question:
Which secure coding best practice ensures servers, frameworks, and
i,- i,- i,- i,- i,- i,- i,- i,- i,-
system components are all running the latest approved versions??
i,- i,- i,- i,- i,- i,- i,- i,-
Answer:
System configuration
i,-
Question:
Which secure coding best practice says to use parameterized queries,
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
encrypted connection strings stored in separate configuration files, and
i,- i,- i,- i,- i,- i,- i,- i,- i,-
strong passwords or multi-factor authentication??
i,- i,- i,- i,-
Answer:
Database security i,-
Question:
Which secure coding best practice says that all information passed to
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
other systems should be encrypted??
i,- i,- i,- i,-
Answer:
Communication security i,-
, Question:
eam members are being introduced during sprint zero in the project
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
kickoff meeting. The person being introduced is a member of the scrum
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
team, responsible for writing feature logic and attending sprint
i,- i,- i,- i,- i,- i,- i,- i,- i,-
ceremonies. Which role is the team member playing?? i,- i,- i,- i,- i,- i,- i,-
Answer:
Software developer i,-
Question:
A software security team member has created data flow diagrams, chosen
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
the STRIDE methodology to perform threat reviews, and created the
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
security assessment for the new product. Which category of secure
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
software best practices did the team member perform??
i,- i,- i,- i,- i,- i,- i,-
Answer:
Architecture analysis i,-
Question:
Team members are being introduced during sprint zero in the project
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
kickoff meeting. The person being introduced will be a facilitator, will try
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
to remove roadblocks and ensure the team is communicating freely, and
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
will be responsible for facilitating all scrum ceremonies. Which role is the
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
team member playing??i,- i,-