2024 ORGANIZED QUESTIONS STEP BY
STEP EXPLANATIONS AND REVIEW
GUIDE AND 100% CORRECT EXPERT
VERIFIED ANSWERS GRADED A+
(LATEST EDITION!!!!!)
Which of the Ship (A5) deliverables of the security development
cycle are performed during the open-source licensing review? -
THE CORRECT ANSWER-license compliance
Which of the Ship (A5) deliverables of the security development
cycle are performed during the final security review? - THE
CORRECT ANSWER-Release and ship
How can you establish your own SDL to build security into a
process appropriate for your organization's needs based on
agile? - THE CORRECT ANSWER-iterative development
How can you establish your own SDL to build security into a
process appropriate for your organization's needs based on
devops? - THE CORRECT ANSWER-continuous integration and
continuous deployments
How can you establish your own SDL to build security into a
process appropriate for your organization's needs based on
cloud? - THE CORRECT ANSWER-API invocation processes
,How can you establish your own SDL to build security into a
process appropriate for your organization's needs based on
digital enterprise? - THE CORRECT ANSWER-enables and improves
business activities
Which phase of penetration testing allows for remediation to be
performed? - THE CORRECT ANSWER-Deploy
Which key deliverable occurs during post-release support? - THE
CORRECT ANSWER-third-party reviews
Which business function of OpenSAMM is associated with
governance? - THE CORRECT ANSWER-Policy and compliance
Which business function of OpenSAMM is associated with
construction? - THE CORRECT ANSWER-Threat assessment
Which business function of OpenSAMM is associated with
verification? - THE CORRECT ANSWER-Code review
Which business function of OpenSAMM is associated with
deployment? - THE CORRECT ANSWER-Vulnerability management
What is the product risk profile? - THE CORRECT ANSWER-A security
assessment deliverable that estimates the actual cost of the
product.
A software security team member has been tasked with creating
a deliverable that provides details on where and to what degree
, sensitive customer information is collected, stored, or created
within a new product offering. What does the team member
need to deliver in order to meet the objective? - THE CORRECT
ANSWER-Privacy impact assessment
What is the first phase in the security development life cycle? -
THE CORRECT ANSWER-A1 Security Assessment
What are the three areas of compliance requirements? - THE
CORRECT ANSWER-Legal, financial, and industry standards
What term refers to how the system should function based on
the environment in which the system will operate? - THE CORRECT
ANSWER-operational requirements
During what phase of SDL do all key stakeholders discuss,
identify, and have common understandings of the security and
privacy implications, considerations, and requirements? - THE
CORRECT ANSWER-A1 Security Assessment
What are the three areas of focus in secure software
requirements? - THE CORRECT ANSWER-Gathering the software
requirements, data classification, and managing data protection
requirements
During what phase of SDL is an initial project outline for
security milestones developed and integrated into the
development project schedule? - THE CORRECT ANSWER-A1 Security
Assessment