100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

C706- Secure Software Design exam questions with answers

Puntuación
-
Vendido
-
Páginas
36
Grado
A+
Subido en
22-10-2025
Escrito en
2025/2026

C706- Secure Software Design exam questions with answers












Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Información del documento

Subido en
22 de octubre de 2025
Número de páginas
36
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

C706- Secure Software Design exam
|\ |\ |\ |\ |\




questions with answers |\ |\




Functional Requirements - CORRECT ANSWERS ✔✔Describe what
|\ |\ |\ |\ |\ |\ |\


an application must do to serve a business need.
|\ |\ |\ |\ |\ |\ |\ |\




Nonfunctional requirements (NFRs) - CORRECT ANSWERS |\ |\ |\ |\ |\ |\


✔✔Address how well the functional requirements are met; they
|\ |\ |\ |\ |\ |\ |\ |\ |\


constrain the functional requirements to specified operating
|\ |\ |\ |\ |\ |\ |\


ranges.


What percent of current business security vulnerabilities are
|\ |\ |\ |\ |\ |\ |\ |\


found within software applications rather than the network
|\ |\ |\ |\ |\ |\ |\ |\


boundaries? - CORRECT ANSWERS ✔✔70% |\ |\ |\ |\




What is the purpose of secure software development? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Reduce the risk of insecure code:
|\ |\ |\ |\ |\ |\ |\




What term describes what has to work right? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Quality |\




What term describes what has to be secure? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Security |\




What are the two challenges to fix vulnerabilities? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔The cost and most security activities happen post-
|\ |\ |\ |\ |\ |\ |\ |\


release

,What is software security? - CORRECT ANSWERS ✔✔The process
|\ |\ |\ |\ |\ |\ |\ |\ |\


of building & designing secure software
|\ |\ |\ |\ |\




What is application security? - CORRECT ANSWERS ✔✔the
|\ |\ |\ |\ |\ |\ |\ |\


process of protecting the complete & designed secure software
|\ |\ |\ |\ |\ |\ |\ |\




What is the purpose of software security? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔Building secure software; designing software to be secure;
|\ |\ |\ |\ |\ |\ |\ |\


and educating software developers, architects, and users about
|\ |\ |\ |\ |\ |\ |\ |\


how to build security in.
|\ |\ |\ |\




What is the purpose of application security? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Protecting software and the systems that software
|\ |\ |\ |\ |\ |\ |\ |\


runs in a post facto, only after development is complete.
|\ |\ |\ |\ |\ |\ |\ |\ |\




What are the three primary goals of the secure software
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


development process? - CORRECT ANSWERS ✔✔Confidentiality, |\ |\ |\ |\ |\ |\


integrity, and availability |\ |\




SDL vs SDLC - CORRECT ANSWERS ✔✔Security Development
|\ |\ |\ |\ |\ |\ |\ |\


Lifecycle: aimed at developing secure software.
|\ |\ |\ |\ |\




Software Development Lifecycle: aimed at developing quality
|\ |\ |\ |\ |\ |\ |\


software.

,What are two goals of the SDL? - CORRECT ANSWERS ✔✔Reduce
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the number of security vulnerabilities & privacy problems and
|\ |\ |\ |\ |\ |\ |\ |\ |\


reduce the severity of the vulnerabilities that remain.
|\ |\ |\ |\ |\ |\ |\




Secure code does not mean _________ ___________ - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Quality code |\ |\




What terms describe quality code? - CORRECT ANSWERS ✔✔Ease
|\ |\ |\ |\ |\ |\ |\ |\


of use, reusable, and maintainable
|\ |\ |\ |\ |\




Under 44 U.S.C., Sec. 3442 Information Security is defined as: -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CORRECT ANSWERS ✔✔The protection of information and
|\ |\ |\ |\ |\ |\ |\


information systems from unauthorized access, use, disclosure,
|\ |\ |\ |\ |\ |\ |\


disruption, modification, or destruction in order to provide
|\ |\ |\ |\ |\ |\ |\ |\


confidentiality, integrity, and availability. |\ |\ |\




Under 44 U.S.C., Sec. 3442 Confidentiality is defined as: -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CORRECT ANSWERS ✔✔Preserving authorized restrictions on
|\ |\ |\ |\ |\ |\


information access and disclosure, including means for protecting
|\ |\ |\ |\ |\ |\ |\


personal privacy and proprietary information.
|\ |\ |\ |\ |\




Under 44 U.S.C., Sec. 3442 Integrity is defined as: - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Guarding against improper information modification
|\ |\ |\ |\ |\


or destruction, and includes ensuring information non-
|\ |\ |\ |\ |\ |\ |\


repudiation and authenticity. |\ |\




Under 44 U.S.C., Sec. 3442 Availability is defined as: - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Ensuring timely and reliable access to and use of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


information.

, What is threat modeling? - CORRECT ANSWERS ✔✔The process of
|\ |\ |\ |\ |\ |\ |\ |\ |\


understanding the potential security threats to the system,
|\ |\ |\ |\ |\ |\ |\ |\ |\


determine risk, and establish appropriate mitigations (What? How
|\ |\ |\ |\ |\ |\ |\


bad is it? How can it be fixed?)
|\ |\ |\ |\ |\ |\ |\ |\




At which point in time is it better to identify and manage security
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


risks? - CORRECT ANSWERS ✔✔The earlier, the better
|\ |\ |\ |\ |\ |\ |\ |\




Define modeling software: - CORRECT ANSWERS ✔✔A way to
|\ |\ |\ |\ |\ |\ |\ |\ |\


envision the interactions of the proposed software within its
|\ |\ |\ |\ |\ |\ |\ |\ |\


intended environment. |\




Define attack surface: - CORRECT ANSWERS ✔✔testing that
|\ |\ |\ |\ |\ |\ |\ |\


should cover the entry points and exit points of an application
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


that may be accessible to an attacker
|\ |\ |\ |\ |\ |\




What increases the attack surface? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\


✔✔Accessibility


What elements of attack surface can be identified with scanning
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


tools? - CORRECT ANSWERS ✔✔Port scanning for open ports and
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


Code analysis tools to locate code that receives input and sends
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


output


What SDL models are available for the development process? -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CORRECT ANSWERS ✔✔Trustworthy Computing Security
|\ |\ |\ |\ |\


Development Lifecycle |\
$21.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
EXAMSTUDYPLUG Stanford University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
308
Miembro desde
3 año
Número de seguidores
107
Documentos
18416
Última venta
4 días hace
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Lee mas Leer menos
4.5

230 reseñas

5
155
4
50
3
13
2
5
1
7

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes