|\ |\ |\ |\ |\ |\
Check and Quiz with answers |\ |\ |\ |\
What are the two common best principles of software
|\ |\ |\ |\ |\ |\ |\ |\ |\
applications in the development process? |\ |\ |\ |\
Quality Code & Secure Code |\ |\ |\ |\
2 multiple choice options
|\ |\ |\
What ensures that the user has the appropriate role and privilege
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
to view data?
|\ |\ |\
Authorization
3 |\multiple |\choice |\options
Which security goal is defined by "guarding against improper
|\ |\ |\ |\ |\ |\ |\ |\ |\
information modification or destruction and ensuring information
|\ |\ |\ |\ |\ |\ |\
non-repudiation and authenticity"? |\ |\
Integrity
3 |\multiple |\choice |\options
Which phase in an SDLC helps to define the problem and scope
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
of any existing systems and determine the objectives of new
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
systems?
Planning
3 |\multiple |\choice |\options
What happens during a dynamic code review?
|\ |\ |\ |\ |\ |\
Programmers monitor system memory, functional behavior, |\ |\ |\ |\ |\ |\
response times, and overall performance. |\ |\ |\ |\
3 |\multiple |\choice |\options
How should you store your application user credentials in your
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
application database? |\
, Store credentials using salted hashes
|\ |\ |\ |\
3 |\multiple |\choice |\options
Which software methodology resembles an assembly-line
|\ |\ |\ |\ |\ |\
approach?
Waterfall model |\
3 |\multiple |\choice |\options
Which software methodology approach provides faster time to
|\ |\ |\ |\ |\ |\ |\ |\
market and higher business value? |\ |\ |\ |\
Agile model |\
3 |\multiple |\choice |\options
In Scrum methodology, who is responsible for making decisions
|\ |\ |\ |\ |\ |\ |\ |\ |\
on the requirements?
|\ |\
Product Owner |\
3 |\multiple |\choice |\options
What is the product risk profile?
|\ |\ |\ |\ |\
A security assessment deliverable that estimates the actual cost
|\ |\ |\ |\ |\ |\ |\ |\ |\
of the product
|\ |\
3 |\multiple |\choice |\options
A software security team member has been tasked with creating
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
a deliverable that provides details on where and to what degree
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
sensitive customer information is collected, stored, or created
|\ |\ |\ |\ |\ |\ |\ |\
within a new product offering. |\ |\ |\ |\
What does the team member need to deliver in order to meet
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
the objective? |\
Privacy impact assessment |\ |\
3 |\multiple |\choice |\options
A software security team member has been tasked with creating
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
a threat model for the login process of a new product.What is the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
first step the team member should take?
|\ |\ |\ |\ |\ |\ |\