100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

D487 Secure SW Design Exam All Combined Review Questions With Revised Correct Answers

Rating
-
Sold
-
Pages
34
Grade
A+
Uploaded on
11-09-2024
Written in
2024/2025

D487 Secure SW Design Exam All Combined Review Questions With Revised Correct Answers What does DREAD stand for? - ANSWER damage potential, reproducibility, exploitability, affected users, and discoverability What is a weakness that can be exploited? - ANSWER vulnerability What is a unified conceptual framework for security auditing? - ANSWER Trike Threat Model What is the path an attacker can take to exploit a vulnerability? - ANSWER threat vector What is reusable software developed externally from the organization's platforms? - ANSWER third party codes What is maliciously changing or modifying persistent data? - ANSWER Tampering What defines what needs to be protected and how it will be protected? - ANSWER software security policy What is performing illegal operations in a system that lacks the ability to trace the prohibited operations? - ANSWER repudiation What is determining the fundamental functions of an app? - ANSWER application decomposition

Show more Read less
Institution
D487
Course
D487











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
D487
Course
D487

Document information

Uploaded on
September 11, 2024
Number of pages
34
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

D487 Secure SW Design
Exam All Combined Review
Questions With Revised Correct
Answers



What does DREAD stand for? - ANSWER damage potential,
reproducibility, exploitability, affected users, and
discoverability


What is a weakness that can be exploited? - ANSWER
vulnerability


What is a unified conceptual framework for security auditing? -
ANSWER Trike Threat Model


What is the path an attacker can take to exploit a vulnerability?
- ANSWER threat vector

,What is reusable software developed externally from the
organization's platforms? - ANSWER third party codes


What is maliciously changing or modifying persistent data? -
ANSWER Tampering


What defines what needs to be protected and how it will be
protected? - ANSWER software security policy


What is performing illegal operations in a system that lacks the
ability to trace the prohibited operations? - ANSWER
repudiation


What is determining the fundamental functions of an app? -
ANSWER application decomposition


What are threat models focused around senior management
and protecting the assets of an organization? - ANSWER
asset-centric threat modeling

, What are threat models that start with visualizing the
application you are building? - ANSWER application-centric
threat modeling


During what phase of the SDL is any policy that exists outside
of the SDL policy is reviewed? - ANSWER A3 Design and
Development


A software security team member has been tasked with
creating a threat model for the login process of a new product.
What is the first step the team member should take? -
ANSWER identify security objectives


What is the reason software security teams host discovery
meetings with stakeholders early in the development life cycle?
- ANSWER To ensure that security is built into the product
from the start


Why should a security team provide documented certification
requirements during the software assessment phase? -
ANSWER Depending on the environment in which the
product resides, certifications may be required by corporate or
government entities before the software can be released to
customers.

, What are two items that should be included in the privacy
impact assessment plan regardless of which methodology is
used? - ANSWER Required process steps, technologies and
techniques


What are the goals of the product risk profile in the SDL
deliverable? - ANSWER Estimate the actual cost of the
product


What are the goals of the SDL project outline in the SDL
deliverable? - ANSWER map security activities to the
development schedule


What are the goals of the threat profile in the SDL deliverable?
- ANSWER Guide security activities to protect the product
from vulnerabilities


What are the goals of listing the third party software in the SDL
deliverable? - ANSWER identify dependence on
unmanaged software

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NURSINGDICTIONARY Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
248
Member since
2 year
Number of followers
87
Documents
2601
Last sold
1 day ago
NURSING ENCYCLOPEDIA

As a Career Tutor, I understand the pressure of managing demanding coursework, exams, and practical requirements across multiple disciplines. These professionally organized revision materials are designed to support students in nursing, healthcare administration, business, information systems, Engineering, health, IT, or trade courses management programs by simplifying complex concepts and reinforcing high-yield academic content. The materials are developed to help students: Understand core theories and practical applications across Multiple Disciplines Review exam relevant content aligned with undergraduate and graduate curriculam To Strengthen critical thinking, analytical reasoning, and decision-making skills Save time with clear, structured summaries instead of overwhelming textbooks Prepare efficiently for tests, assignments, case studies, and professional exams Each resource is created with academic standards in mind, integrating real world examples, industry terminology, and evidence based concepts commonly required in professional programs. Whether you are studying nursing fundamentals, healthcare management, information systems, project management, business strategy, Engineering these materials provide focused, reliable support for academic success. These revision guides are ideal for: Nursing and allied health students Healthcare administration and public health students Business, MBA, and management students Information technology and information systems students, engineering, business, IT, or trade courses If you are looking for clear, student-friendly, exam-focused revision materials that support multiple career pathways, these resources are designed to help you study smarter, perform better, and stay confident throughout your academic journey. WISH YOU SUCCESS!!

Read more Read less
4.1

29 reviews

5
15
4
5
3
7
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions