100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Secure Software Design - C706 exam with correct answers,

Puntuación
-
Vendido
-
Páginas
32
Grado
A+
Subido en
22-10-2025
Escrito en
2025/2026

Secure Software Design - C706 exam with correct answers,

Institución
Grado











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
22 de octubre de 2025
Número de páginas
32
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Secure Software Design - C706 exam with
|\ |\ |\ |\ |\ |\ |\




correct answers |\




Protecting the software and the systems on which it runs after
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


release, after dev is complete - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\


✔✔Application security |\




Three core elements of security - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\


✔✔Confidentiality, integrity, and availability (the C.I.A. model |\ |\ |\ |\ |\ |\




Tools that look for a fixed set of patterns or rules in the code in a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


manner similar to virus-checking programs - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\


✔✔Static analysis tools
|\ |\




Ensures that the user has the appropriate role and privilege to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


view data - CORRECT ANSWERS ✔✔Authorization
|\ |\ |\ |\ |\




Ensures that the user is who he or she claims to be and that the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


data come from the appropriate place - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔Authentication


Question 4 : |\ |\




What is responsible for preserving authorized restrictions on
|\ |\ |\ |\ |\ |\ |\ |\


information access and disclosure, including means for protecting
|\ |\ |\ |\ |\ |\ |\


personal privacy and proprietary information? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Question 4 |\ |\

,Confidentiality


Q5:


What is responsible for guarding against improper information
|\ |\ |\ |\ |\ |\ |\ |\


modification or destruction, and includes ensuring information
|\ |\ |\ |\ |\ |\ |\


non-repudiation and authenticity? - CORRECT ANSWERS ✔✔Q5: |\ |\ |\ |\ |\ |\




Integrity


Q6:


Which concept in the software life cycle understands the
|\ |\ |\ |\ |\ |\ |\ |\ |\


potential security threats to the system, determines risk, and
|\ |\ |\ |\ |\ |\ |\ |\ |\


establishes appropriate mitigations? - CORRECT ANSWERS ✔✔Q6:
|\ |\ |\ |\ |\ |\




Threat modeling |\




Q7:


The idea behind is simply to understand the potential security
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


threats to the system, determine risk, and establish appropriate
|\ |\ |\ |\ |\ |\ |\ |\ |\


mitigations. When it is performed correctly, it occurs early in the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


project life cycle and can be used to find security design issues
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


before code is committed. - CORRECT ANSWERS ✔✔Q7:
|\ |\ |\ |\ |\ |\ |\

,threat modeling |\




_Q8:


____________is about building secure software: designing software |\ |\ |\ |\ |\ |\ |\


to be secure; making sure that software is secure; and educating
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


software developers, architects, and users about how to build
|\ |\ |\ |\ |\ |\ |\ |\ |\


security in. - CORRECT ANSWERS ✔✔Q8:
|\ |\ |\ |\ |\




software security |\




Q9:


__________, as the name suggests, is really aimed at developing
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


secure software, not necessarily quality software - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Q9: |\




SDL methodology
|\




The most well-known SDL model is the __________, a process that
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


Microsoft has adopted for the development of software that
|\ |\ |\ |\ |\ |\ |\ |\ |\


needs to withstand malicious attack. This is considered the most
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


mature of the top three models. - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔Trustworthy Computing Security Development Lifecycle |\ |\ |\ |\




_________This is a study of real-world software security initiatives|\ |\ |\ |\ |\ |\ |\ |\ |\


organized so that you can determine where you stand with your
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\

, software security initiative and how to evolve your efforts over
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


time. It is a set of best practices that Cigital developed by
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


analyzing real-world data from nine leading software security
|\ |\ |\ |\ |\ |\ |\ |\


initiatives and creating a framework based on common areas of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


success. There are 12 practices organized into four domains.
|\ |\ |\ |\ |\ |\ |\ |\ |\


These practices are used to organize the 109 BSIMM activities
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


(BSIMM 4 has a total of 111 activities). - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔BSIMM ( short for Building Security In Maturity Model.)
|\ |\ |\ |\ |\ |\ |\ |\




_______________provides guidance to help organizations embed |\ |\ |\ |\ |\ |\


security within their processes, including application lifecycle
|\ |\ |\ |\ |\ |\ |\


processes, that help to secure applications running in the|\ |\ |\ |\ |\ |\ |\ |\ |\


environment. It is a risk-based framework to continuously |\ |\ |\ |\ |\ |\ |\ |\


improve security through process integration and improvements
|\ |\ |\ |\ |\ |\ |\


in managing applications. It takes a process approach by design.
|\ |\ |\ |\ |\ |\ |\ |\ |\


- CORRECT ANSWERS ✔✔The ISO/IEC 27034 standard
|\ |\ |\ |\ |\ |\ |\




_____________ is a nonprofit organization dedicated to increasing |\ |\ |\ |\ |\ |\ |\ |\


trust in information and communications technology products
|\ |\ |\ |\ |\ |\ |\


and services through the advancement of effective software
|\ |\ |\ |\ |\ |\ |\ |\


assurance methods. SAFECode is a global, industry-led effort to
|\ |\ |\ |\ |\ |\ |\ |\ |\


identify and promote best practices for developing and delivering
|\ |\ |\ |\ |\ |\ |\ |\


more secure and reliable software, hardware, and services. -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CORRECT ANSWERS ✔✔The Software Assurance Forum for
|\ |\ |\ |\ |\ |\ |\


Excellence in Code (SAFECode) |\ |\ |\




______________ is dedicated to improving software assurance by |\ |\ |\ |\ |\ |\ |\ |\


developing methods to enable software tool evaluations, |\ |\ |\ |\ |\ |\ |\


measuring the effectiveness of tools and techniques, and |\ |\ |\ |\ |\ |\ |\ |\


identifying gaps in tools and methods. - CORRECT ANSWERS |\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔The NIST SAMATE (Software Assurance Metrics and Tool
|\ |\ |\ |\ |\ |\ |\ |\


Evaluation) project |\
$22.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
EXAMSTUDYPLUG Stanford University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
308
Miembro desde
3 año
Número de seguidores
107
Documentos
18416
Última venta
4 días hace
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Lee mas Leer menos
4.5

230 reseñas

5
155
4
50
3
13
2
5
1
7

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes