D487: Secure Software Design Questions and Answers Top Graded 2024
What are the two common best principles of software applications in the development process? Choose 2 answers. Quality code Secure code Information security Integrity Availability Quality code Secure code "Quality code" is correct. Quality code is efficient code that is easy to maintain and reusable. "Secure code" is correct. Secure code authorizes and authenticates every user transaction, logs the transaction, and denies all unauthorized requisitions. What ensures that the user has the appropriate role and privilege to view data? Authentication Multi-factor authentication Encryption Information security Authorization Authorization Authorization ensures a user's information and credentials are approved by the system. Which security goal is defined by "guarding against improper information modification or destruction and ensuring information non-repudiation and authenticity"? Integrity Quality Availability Reliability Integrity The data must remain unchanged by unauthorized users and remain reliable from the data entry point to the database and back. Which phase in an SDLC helps to define the problem and scope of any existing systems and determine the objectives of new systems? Requirements Design Planning Testing Planning The planning stage sets the project schedule and looks at the big picture. What happens during a dynamic code review? Programmers monitor system memory, functional behavior, response times, and overall performance. Customers perform tests to check software meets requirements. An analysis of computer programs without executing them is performed. Input fields are supplied with unexpected input and tested. Programmers monitor system memory, functional behavior, response times, and overall performance. How should you store your application user credentials in your application database? Use application logic to encrypt credentials Store credentials as clear text Store credentials using Base 64 encoded Store credentials using salted hashes Store credentials using salted hashes
Written for
- Institution
- D487
- Course
- D487
Document information
- Uploaded on
- June 21, 2024
- Number of pages
- 40
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- d487
- secure software design
-
d487 secure software design questions and answers
-
d487 secure software design