100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Secure Software Design - C706 exam with correct answers,

Rating
-
Sold
-
Pages
32
Grade
A+
Uploaded on
22-10-2025
Written in
2025/2026

Secure Software Design - C706 exam with correct answers,












Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
October 22, 2025
Number of pages
32
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Secure Software Design - C706 exam with
|\ |\ |\ |\ |\ |\ |\




correct answers |\




Protecting the software and the systems on which it runs after
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


release, after dev is complete - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\


✔✔Application security |\




Three core elements of security - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\


✔✔Confidentiality, integrity, and availability (the C.I.A. model |\ |\ |\ |\ |\ |\




Tools that look for a fixed set of patterns or rules in the code in a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


manner similar to virus-checking programs - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\


✔✔Static analysis tools
|\ |\




Ensures that the user has the appropriate role and privilege to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


view data - CORRECT ANSWERS ✔✔Authorization
|\ |\ |\ |\ |\




Ensures that the user is who he or she claims to be and that the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


data come from the appropriate place - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔Authentication


Question 4 : |\ |\




What is responsible for preserving authorized restrictions on
|\ |\ |\ |\ |\ |\ |\ |\


information access and disclosure, including means for protecting
|\ |\ |\ |\ |\ |\ |\


personal privacy and proprietary information? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Question 4 |\ |\

,Confidentiality


Q5:


What is responsible for guarding against improper information
|\ |\ |\ |\ |\ |\ |\ |\


modification or destruction, and includes ensuring information
|\ |\ |\ |\ |\ |\ |\


non-repudiation and authenticity? - CORRECT ANSWERS ✔✔Q5: |\ |\ |\ |\ |\ |\




Integrity


Q6:


Which concept in the software life cycle understands the
|\ |\ |\ |\ |\ |\ |\ |\ |\


potential security threats to the system, determines risk, and
|\ |\ |\ |\ |\ |\ |\ |\ |\


establishes appropriate mitigations? - CORRECT ANSWERS ✔✔Q6:
|\ |\ |\ |\ |\ |\




Threat modeling |\




Q7:


The idea behind is simply to understand the potential security
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


threats to the system, determine risk, and establish appropriate
|\ |\ |\ |\ |\ |\ |\ |\ |\


mitigations. When it is performed correctly, it occurs early in the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


project life cycle and can be used to find security design issues
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


before code is committed. - CORRECT ANSWERS ✔✔Q7:
|\ |\ |\ |\ |\ |\ |\

,threat modeling |\




_Q8:


____________is about building secure software: designing software |\ |\ |\ |\ |\ |\ |\


to be secure; making sure that software is secure; and educating
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


software developers, architects, and users about how to build
|\ |\ |\ |\ |\ |\ |\ |\ |\


security in. - CORRECT ANSWERS ✔✔Q8:
|\ |\ |\ |\ |\




software security |\




Q9:


__________, as the name suggests, is really aimed at developing
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


secure software, not necessarily quality software - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Q9: |\




SDL methodology
|\




The most well-known SDL model is the __________, a process that
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


Microsoft has adopted for the development of software that
|\ |\ |\ |\ |\ |\ |\ |\ |\


needs to withstand malicious attack. This is considered the most
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


mature of the top three models. - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔Trustworthy Computing Security Development Lifecycle |\ |\ |\ |\




_________This is a study of real-world software security initiatives|\ |\ |\ |\ |\ |\ |\ |\ |\


organized so that you can determine where you stand with your
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\

, software security initiative and how to evolve your efforts over
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


time. It is a set of best practices that Cigital developed by
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


analyzing real-world data from nine leading software security
|\ |\ |\ |\ |\ |\ |\ |\


initiatives and creating a framework based on common areas of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


success. There are 12 practices organized into four domains.
|\ |\ |\ |\ |\ |\ |\ |\ |\


These practices are used to organize the 109 BSIMM activities
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


(BSIMM 4 has a total of 111 activities). - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔BSIMM ( short for Building Security In Maturity Model.)
|\ |\ |\ |\ |\ |\ |\ |\




_______________provides guidance to help organizations embed |\ |\ |\ |\ |\ |\


security within their processes, including application lifecycle
|\ |\ |\ |\ |\ |\ |\


processes, that help to secure applications running in the|\ |\ |\ |\ |\ |\ |\ |\ |\


environment. It is a risk-based framework to continuously |\ |\ |\ |\ |\ |\ |\ |\


improve security through process integration and improvements
|\ |\ |\ |\ |\ |\ |\


in managing applications. It takes a process approach by design.
|\ |\ |\ |\ |\ |\ |\ |\ |\


- CORRECT ANSWERS ✔✔The ISO/IEC 27034 standard
|\ |\ |\ |\ |\ |\ |\




_____________ is a nonprofit organization dedicated to increasing |\ |\ |\ |\ |\ |\ |\ |\


trust in information and communications technology products
|\ |\ |\ |\ |\ |\ |\


and services through the advancement of effective software
|\ |\ |\ |\ |\ |\ |\ |\


assurance methods. SAFECode is a global, industry-led effort to
|\ |\ |\ |\ |\ |\ |\ |\ |\


identify and promote best practices for developing and delivering
|\ |\ |\ |\ |\ |\ |\ |\


more secure and reliable software, hardware, and services. -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CORRECT ANSWERS ✔✔The Software Assurance Forum for
|\ |\ |\ |\ |\ |\ |\


Excellence in Code (SAFECode) |\ |\ |\




______________ is dedicated to improving software assurance by |\ |\ |\ |\ |\ |\ |\ |\


developing methods to enable software tool evaluations, |\ |\ |\ |\ |\ |\ |\


measuring the effectiveness of tools and techniques, and |\ |\ |\ |\ |\ |\ |\ |\


identifying gaps in tools and methods. - CORRECT ANSWERS |\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔The NIST SAMATE (Software Assurance Metrics and Tool
|\ |\ |\ |\ |\ |\ |\ |\


Evaluation) project |\

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EXAMSTUDYPLUG Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
308
Member since
3 year
Number of followers
107
Documents
18416
Last sold
4 days ago
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Read more Read less
4.5

230 reviews

5
155
4
50
3
13
2
5
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions