Solutions
What is the SDLC? (In Order) Correct Ans - - Planning,
requirements analysis, design, implementation, testing,
maintenance.
The two security models: Correct Ans - Building Security in
Maturing Model (BSIMM) and Open Web Application Security
Project (OWASP).
1. What are the major phases of the SDLC? Correct Ans - 1.
Planning
2. Requirements Analysis
3. Design
4. Development (Implementation)
5. Testing
6. Deployment
7. Maintenance
8. End of Life
Planning Correct Ans - Establishes the scope and purpose of
the project. Such as resources, timeline, and risk.
Requirements Analysis Correct Ans - Defines functional and
non-functional requirements
Design Correct Ans - Translates requirements into a technical
blueprint.
Development (Implementation) Correct Ans - The actual
coding or programming of the software.
, Testing- Correct Ans - Ensures the software works as expected
by identifying bugs and errors.
Deployment- Correct Ans - The software is delivered and
installed for users or customers.
Maintenance- Correct Ans - Ongoing updates, fixes, and
improvements after the software is in use.
End of Life Correct Ans - During this phase of the SDLC, the
proper steps for removing software completely are considered.
Explain how the Common Computer Vulnerabilities and Exposures
(CVE) aids in identifying threats and vulnerabilities. Correct Ans -
· The CVE helps aid in identifying threats and vulnerabilities by
providing a standardized naming convention and a centralized
catalog of known security issues.
· When a new vulnerability is discovered, it is assigned a unique CVE
ID. This makes it easier for cybersecurity professionals to reference
and track the vulnerability across various platforms.
Explain the advantages and disadvantages of the Waterfall Software
Development methodology. Correct Ans - The waterfall
methodology is structured into sequential phases or "packages".
Each phase must be completed before moving onto the next phase.
The phases include requirements, system design, implementation,
integration & testing, deployment, and maintenance.
Advantages:
· Clear structure
· Defined requirements
· Easy to manage
· Documentation
Disadvantages: