100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

D487 - SECURE SOFTWARE DESIGN KNOWLEGE CHECK AND QUIZ

Puntuación
-
Vendido
-
Páginas
6
Grado
A+
Subido en
30-05-2025
Escrito en
2024/2025

D487 - SECURE SOFTWARE DESIGN KNOWLEGE CHECK AND QUIZ

Institución
D487
Grado
D487









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
D487
Grado
D487

Información del documento

Subido en
30 de mayo de 2025
Número de páginas
6
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

D487 - SECURE SOFTWARE DESIGN KNOWLEGE
CHECK AND QUIZ



What are the two common best principles of software applications in the development
process? - Answers :Quality Code & Secure Code

What ensures that the user has the appropriate role and privilege to view data? -
Answers :Authorization

Which security goal is defined by "guarding against improper information modification or
destruction and ensuring information non-repudiation and authenticity"? - Answers
:Integrity

Which phase in an SDLC helps to define the problem and scope of any existing
systems and determine the objectives of new systems? - Answers :Planning

What happens during a dynamic code review? - Answers :Programmers monitor system
memory, functional behavior, response times, and overall performance.

How should you store your application user credentials in your application database? -
Answers :Store credentials using salted hashes

Which software methodology resembles an assembly-line approach? - Answers
:Waterfall model

Which software methodology approach provides faster time to market and higher
business value? - Answers :Agile model

In Scrum methodology, who is responsible for making decisions on the requirements? -
Answers :Product Owner

What is the product risk profile? - Answers :A security assessment deliverable that
estimates the actual cost of the product

A software security team member has been tasked with creating a deliverable that
provides details on where and to what degree sensitive customer information is
collected, stored, or created within a new product offering.

What does the team member need to deliver in order to meet the objective? - Answers
:Privacy impact assessment

, A software security team member has been tasked with creating a threat model for the
login process of a new product.What is the first step the team member should take? -
Answers :Identify security objectives

What are three parts of the STRIDE methodology? - Answers :Spoofing, Elevation,
Tampering

What is the reason software security teams host discovery meetings with stakeholders
early in the development life cycle? - Answers :To ensure that security is built into the
product from the start

Why should a security team provide documented certification requirements during the
software assessment phase? - Answers :Depending on the environment in which the
product resides, certifications may be required by corporate or government entities
before the software can be released to customers.

What are two items that should be included in the privacy impact assessment plan
regardless of which methodology is used? - Answers :Required process steps &
Technologies and techniques

What are the goals of each SDL deliverable? - Product Risk Profile - Answers :Estimate
the actual cost of the product

What are the goals of each SDL deliverable? -SDL project outline - Answers :Map
security activities to the development schedule

What are the goals of each SDL deliverable? - Threat profile - Answers :Guide security
activities to protect the product from vulnerabilities

What are the goals of each SDL deliverable? -List of third-party software - Answers
:Identify the dependence on unmanaged software

What is a threat action that is designed to illegally access and use another person's
credentials? - Answers :Spoofing

What are two steps of the threat modeling process? - Answers :Survey The application
& Decompose the application

What do the "A" and the first "D" in the DREAD acronym represent? - Answers :Damage
& Affected Users

Which shape indicates each type of flow diagram element? - External elements -
Answers :Rectangle

Which shape indicates each type of flow diagram element? - Data Store - Answers :Two
Parallel horizontal lines
$13.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
GEEKA YALA UNIVERSITY
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2011
Miembro desde
3 año
Número de seguidores
1447
Documentos
48584
Última venta
4 horas hace

3.8

345 reseñas

5
172
4
61
3
44
2
16
1
52

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes