100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

D487: SECURE SOFTWARE DESIGN QUESTIONS AND CORRECT ANSWERS WIH RATIONALES GRDED A+ 2025

Beoordeling
-
Verkocht
-
Pagina's
25
Cijfer
A+
Geüpload op
01-05-2025
Geschreven in
2024/2025

D487: SECURE SOFTWARE DESIGN QUESTIONS AND CORRECT ANSWERS WIH RATIONALES GRDED A+ 2025D487: SECURE SOFTWARE DESIGN QUESTIONS AND CORRECT ANSWERS WIH RATIONALES GRDED A+ 2025D487: SECURE SOFTWARE DESIGN QUESTIONS AND CORRECT ANSWERS WIH RATIONALES GRDED A+ 2025D487: SECURE SOFTWARE DESIGN QUESTIONS AND CORRECT ANSWERS WIH RATIONALES GRDED A+ 2025

Meer zien Lees minder
Instelling
D487: SECURE SOFTWARE DESIGN
Vak
D487: SECURE SOFTWARE DESIGN










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
D487: SECURE SOFTWARE DESIGN
Vak
D487: SECURE SOFTWARE DESIGN

Documentinformatie

Geüpload op
1 mei 2025
Aantal pagina's
25
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

D487: SECURE SOFTWARE DESIGN
QUESTIONS AND CORRECT ANSWERS
WIH RATIONALES GRDED A+ 2025




What are the two common best principles of software applications in the
development process? Choose 2 answers.
Quality code
Secure code
Information security
Integrity
Availability
Quality code
Secure code

"Quality code" is correct. Quality code is efficient code that is easy to
maintain and reusable.
"Secure code" is correct. Secure code authorizes and authenticates every user
transaction, logs the transaction, and denies all unauthorized requisitions.
What ensures that the user has the appropriate role and privilege to view data?
Authentication
Multi-factor authentication
Encryption

,Information security
Authorization
Authorization

Authorization ensures a user's information and credentials are approved by
the system.
Which security goal is defined by "guarding against improper information
modification or destruction and ensuring information non-repudiation and
authenticity"?
Integrity
Quality
Availability
Reliability
Integrity

The data must remain unchanged by unauthorized users and remain reliable
from the data entry point to the database and back.
Which phase in an SDLC helps to define the problem and scope of any existing
systems and determine the objectives of new systems?
Requirements
Design
Planning
Testing
Planning

The planning stage sets the project schedule and looks at the big picture.
What happens during a dynamic code review?
Programmers monitor system memory, functional behavior, response times, and
overall performance.
Customers perform tests to check software meets requirements.
An analysis of computer programs without executing them is performed.
Input fields are supplied with unexpected input and tested.
Programmers monitor system memory, functional behavior, response times, and
overall performance.

, How should you store your application user credentials in your application
database?
Use application logic to encrypt credentials
Store credentials as clear text
Store credentials using Base 64 encoded
Store credentials using salted hashes
Store credentials using salted hashes

Hashing is a one-way process that converts a password to ciphertext using
hash algorithms. Password salting adds random characters before or after a
password prior to hashing to obfuscate the actual password.
Which software methodology resembles an assembly-line approach?
V-model
Agile model
Iterative model
Waterfall model
Waterfall model

Waterfall model is a continuous software development model in which the
development steps flow steadily downwards.
Which software methodology approach provides faster time to market and higher
business value?
Iterative model
Waterfall model
V-model
Agile model
Agile model

In the agile model, projects are divided into small incremental builds that provide
working software at the end of each iteration and adds value to business.
In Scrum methodology, who is responsible for making decisions on the
requirements?
Scrum Team
Product Owner

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Anahsmith Walden University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
18
Lid sinds
2 jaar
Aantal volgers
9
Documenten
1071
Laatst verkocht
1 maand geleden

3,8

4 beoordelingen

5
2
4
1
3
0
2
0
1
1

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen