whether the product meets security mandates? ......answer. ... A5 policy
compliance analysis
Which post-release support activity defines the process to communicate, identify,
and alleviate security threats? ......answer. ... PRSA1: External vulnerability
disclosure response
What are two core practice areas of the OWASP Security Assurance Maturity
Model (OpenSAMM)? ......answer. ... Governance, Construction
Which practice in the Ship (A5) phase of the security development cycle uses
tools to identify weaknesses in the product? ......answer. ....Vulnerability scan
,Which post-release support activity should be completed when companies are
joining together? ......answer. ... Security architectural reviews
Which of the Ship (A5) deliverables of the security development cycle are
performed during the A5 policy compliance analysis? ......answer. ... Analyze
activities and standards
, Which of the Ship (A5) deliverables of the security development cycle are
performed during the code-assisted penetration testing? ......answer. ... white-box
security test
Which of the Ship (A5) deliverables of the security development cycle are
performed during the open-source licensing review? ......answer. ... license
compliance
Which of the Ship (A5) deliverables of the security development cycle are
performed during the final security review? ......answer. .... Release and ship
How can you establish your own SDL to build security into a process appropriate
for your organization's needs based on agile? ......answer. ... iterative
development
How can you establish your own SDL to build security into a process appropriate
for your organization's needs based on devops? ......answer. ... continuous
integration and continuous deployments
How can you establish your own SDL to build security into a process appropriate
for your organization's needs based on cloud? ......answer. ... API invocation
processes