PRACTICE EXAM QUESTIONS
WITH CORRECT DETAILED
ANSWERS | ALREADY GRADED
A+<RECENT VERSION>
1. The __________ requires that in a particular abstraction layer of a
computing environment, every module must be able to access only the
information and resources that are necessary for its legitimate purpose.
A software assurance forum
B principle of least privilege
C software security maturity model
D secure development lifecycle - answer b
2. __________ is an important component of the sdl process and should be
considered a system design principle of significant importance in all
phases of the sdlc. A failure to protect it will lead to an erosion of trust.
authenticity
B privacy
C confidentiality
D integrity - answer b
,3. A __________ is a team solely dedicated to conduct security m&a
assessments, third-party reviews, post-release certifications, internal
reviews for new product combinations of cloud deployments, and review
for legacy software that is still in use or about to be re-used.
A psirt
B sdlc
C ncsd
D samate - answer a
4. The __________ is a list of information security vulnerabilities and
exposures that aims to provide common names for publicly known
problems.
A ncsd
B samate
C cve
D sdlc - answer c
5. _____________ requirements describe what an application must do to
serve a business need. For example, an application must be able to allow
a consumer to complete their transaction on the site using a credit card. -
answer functional
6. ______________ requirements address how well the functional
requirements are met, or to put it another way, they constrain the
functional requirements to specified operating ranges.
7. They address areas such as capacity planning, uptime, response times,
maintainability, and portability (web, mobile, etc.). Think of them like
guardrails on a highway-you are free to operate on the road within the
boundaries of the guardrails. - answer nonfunctional
,8. He __________ meeting is essentially an sdl kick-off meeting where the
key sdlc stakeholders get on the same page at the beginning of the
process so that security is built in rather than bolted on post-release.
A kickoff
B discovery
C planning
D hotwash - answer b
9. The sdl __________ should outline security milestones based on the
information gained during the previous phase and integrate them into the
overall sdlc schedule to allow proper preparation as changes occur.
A discovery meeting
B project plan
C metrics
D impact assessment - answer b
10.It is important in __________ meetings, when the software security team
is included, to ensure that security is a key element of the sdlc and is built
into the process.
A hot wash
B discovery
C kick-off
D planning - answer c
11.Which requirements describe what an application must do to serve a
business need?
, A fictional requirements
B nonfictional requirements
C functional requirements
D nonfunctional requirements - answer c
12.Which requirements address how well the requirements are met or
constrain the requirements to specified operating ranges?
A functional requirements
B nonfunctional requirements
C fictional requirements
D nonfictional requirements - answer b
13.The setting of the __________ for any sdl phase will make it more
effective and will help in performing post-mortem afterwards to
understand what worked and what did not.
A discovery meeting
B project plan
C key success factors
D impact assessment - answer c
14.Unless the senior leadership of the development organization and the
management team support the sdl, it will likely fail. It must be driven by a
policy that is signed off on, promulgated, and provides support by the
software development management team and ideally by the ceo. (true or
false)
A false
B true - answer b
15.What are these known as?