QUESTIONS AND VERIFIED ANSWERS 2026| //GRADE +//
What type of functional security requirement involves receiving,
processing, storing, transmitting, and delivering in report form?
Primary dataflow
Which nonfunctional security requirement provides a way to capture
information correctly and a way to store that information to help
support later audits?
Logging
Which security concept refers to the quality of information that could
cause harm or damage if disclosed?
Sensitivity
Which technology would be an example of an injection flaw, according
to the OWASP Top 10?
SQL
A company is creating a new software to track customer balance and
wants to design a secure application.
Which best practice should be applied?
Create multiple layers of protection so that a subsequent layer provides
protection if a layer is breached
A company is developing a secure software that has to be evaluated and
tested by a large number of experts.
, Which security principle should be applied?
Open design
Which type of TCP scanning indicates that a system is moving to the
second phase in a three-way TCP handshake?
TCP SYN scanning
Which evaluation technique provides invalid, unexpected, or random
data to the inputs of a computer software program?
Fuzz testing
Which approach provides an opportunity to improve the software
development life cycle by tailoring the process to the specific risks
facing the organization?
Software assurance maturity model (SAMM)
Which phase contains sophisticated software development processes
that ensure that feedback from one phase reaches to the previous
phase to improve future results?
Optimizing
The activities for compliance include ensuring collected information is
only used for intended purposes, information is timely and accurate,
and the public is aware of the information collected and how it is used.
Which well-accepted secure development standard is addressed by
these activities?
PIA
An organization is in the process of building an application for its
banking software.