CYB 505 Secure Software Exam
Questions With 100% Verified Answers
Your organization has asked you to develop a security model by
keeping in mind that the confidentiality of data should be of utmost
priority. Which of the following security models will you develop? -
correct answer ✅Bell-LaPadula
Which of the following options is a team-based activity where
members of the development team inspect code? -
correct answer ✅Code Review
You are responsible for documenting all aspects of your company's
security program. As part of this documentation, you need to
define security controls, manage authorized users and access
controls, and perform operational tasks. Which of the following
roles is your designation? -
correct answer ✅DATA CUSTODIAN
Which of the following statements are the true about use case?
Each
correct answer represents a complete solution. Choose all that
apply. -
correct answer ✅It determines functional requirements in
developer-friendly terms.
,CYB 505 Secure Software Exam
Questions With 100% Verified Answers
It is constructed of actors representing users and intended system
behaviors.
Kevin works as a security analyst in an organization. He is
concerned that an application on which his team is currently
developing is vulnerable to unexpected user input that could lead
to issues within memory. Because of these issues, the application is
affected in a harmful manner leading to potential exploitation.
Which of the following describes the attack that is taking place in
the given scenario? -
correct answer ✅BUFFER OVERFLOW
Alex works as a software developer in an organization. He wants to
examine configuration issues and how they affect the program
outcome and data issues that can result in programmatic instability
can also be investigated in the simulated environment. Which of
the following tests can he choose to accomplish his task? -
correct answer ✅simulation testing
Jack works as a chief information security officer at a major non-
profit hospital group. Which of the following regulations most
directly covers the way that his organization handles medical
records? -
correct answer ✅HIPPA
, CYB 505 Secure Software Exam
Questions With 100% Verified Answers
Ria works as a software developer in an organization. She wants to
select an approved algorithm but she is facing some issues in the
selection process. Which of the following standards can she choose
for issues she is facing in the given scenario? -
correct answer ✅FIPS-140-2
In which of the following attacks is the computer's own microphone
used to record keystrokes and then decode them based on the
different sounds each key makes? -
correct answer ✅Acoustic
You work as a cybersecurity analyst in an organization and are
working with several IT professionals to determine all of the
connected systems in your organization. You are creating an
illustration for representing the mapping of the servers,
workstations, printers, and other connected devices and their
purposes for an analysis of how information is input, processed,
stored, and output from each system. This graphical representation
examines the system from the information flow perspective. Which
business analysis process are you completing in the given scenario?
-
correct answer ✅Data Flow diagram
Questions With 100% Verified Answers
Your organization has asked you to develop a security model by
keeping in mind that the confidentiality of data should be of utmost
priority. Which of the following security models will you develop? -
correct answer ✅Bell-LaPadula
Which of the following options is a team-based activity where
members of the development team inspect code? -
correct answer ✅Code Review
You are responsible for documenting all aspects of your company's
security program. As part of this documentation, you need to
define security controls, manage authorized users and access
controls, and perform operational tasks. Which of the following
roles is your designation? -
correct answer ✅DATA CUSTODIAN
Which of the following statements are the true about use case?
Each
correct answer represents a complete solution. Choose all that
apply. -
correct answer ✅It determines functional requirements in
developer-friendly terms.
,CYB 505 Secure Software Exam
Questions With 100% Verified Answers
It is constructed of actors representing users and intended system
behaviors.
Kevin works as a security analyst in an organization. He is
concerned that an application on which his team is currently
developing is vulnerable to unexpected user input that could lead
to issues within memory. Because of these issues, the application is
affected in a harmful manner leading to potential exploitation.
Which of the following describes the attack that is taking place in
the given scenario? -
correct answer ✅BUFFER OVERFLOW
Alex works as a software developer in an organization. He wants to
examine configuration issues and how they affect the program
outcome and data issues that can result in programmatic instability
can also be investigated in the simulated environment. Which of
the following tests can he choose to accomplish his task? -
correct answer ✅simulation testing
Jack works as a chief information security officer at a major non-
profit hospital group. Which of the following regulations most
directly covers the way that his organization handles medical
records? -
correct answer ✅HIPPA
, CYB 505 Secure Software Exam
Questions With 100% Verified Answers
Ria works as a software developer in an organization. She wants to
select an approved algorithm but she is facing some issues in the
selection process. Which of the following standards can she choose
for issues she is facing in the given scenario? -
correct answer ✅FIPS-140-2
In which of the following attacks is the computer's own microphone
used to record keystrokes and then decode them based on the
different sounds each key makes? -
correct answer ✅Acoustic
You work as a cybersecurity analyst in an organization and are
working with several IT professionals to determine all of the
connected systems in your organization. You are creating an
illustration for representing the mapping of the servers,
workstations, printers, and other connected devices and their
purposes for an analysis of how information is input, processed,
stored, and output from each system. This graphical representation
examines the system from the information flow perspective. Which
business analysis process are you completing in the given scenario?
-
correct answer ✅Data Flow diagram