COMPLETE REAL EXAM QUESTIONS AND CORRECT
ANSWERS (VERIFIED ANSWERS) ALREADY GRADED
A+ / NEWEST EXAM / JUST RELEASED!!
A software security team member has been tasked with
creating a threat model for the login process of a new product.
What is the first step the team member should take? -
ANSWER-identify security objectives
What is the reason software security teams host discovery
meetings with stakeholders early in the development life cycle?
- ANSWER-To ensure that security is built into the product from
the start
Why should a security team provide documented
certification requirements
during the software assessment phase? - ANSWER-
Depending on the
environment in which the product resides, certifications
may be required by
corporate or government entities before the software can
be released to
customers.
,What are two items that should be included in the privacy
impact assessment
plan regardless of which methodology is used? - ANSWER-
Required process
steps, technologies and
techniques
What are the goals of the product risk profile in the SDL
deliverable? -
ANSWER-Estimate the actual cost of
the product
What are the goals of the SDL project outline in the SDL
deliverable? -
ANSWER-map security activities to the
development schedule
What are the goals of the threat profile in the SDL
deliverable? - ANSWER-
Guide security activities to protect the product from
vulnerabilities
What are the goals of listing the third party software in the SDL
deliverable? -
ANSWER-identify dependence on
unmanaged software
What is a threat action that is designed to illegally access
and use another
, person's credentials? - ANSWER-
Spoofing
Which shape indicates the external elements in the flow
diagram? - ANSWER-
Rectangle
Which shape indicates the data storage in the flow diagram?
- ANSWER-two
parallel horizontal
lines
Which shape indicates the data flow in the flow diagram? -
ANSWER-single
solid line with an
arrow
Which shape indicates the trust boundary in the flow
diagram? - ANSWER-
dashed
line
What are the two deliverables of the Architecture phase
of the SDL? -
ANSWER-threat modeling artifacts, policy
compliance analysis
What SDL security assessment deliverable is used as an
input to an SDL