100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

D487 Secure Software Design Exam Prep 2025/2026 – Cybersecurity, Secure Coding, and Practice Questions Test Bank

Beoordeling
-
Verkocht
1
Pagina's
536
Cijfer
A+
Geüpload op
28-01-2025
Geschreven in
2024/2025

D487 Secure Software Design Exam Prep 2025/2026 – Cybersecurity, Secure Coding, and Practice Questions Test Bank

Instelling
D487 - Secure Software Design
Vak
D487 - Secure Software Design











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
D487 - Secure Software Design
Vak
D487 - Secure Software Design

Documentinformatie

Geüpload op
28 januari 2025
Bestand laatst geupdate op
21 augustus 2025
Aantal pagina's
536
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

D487: Secure Software Design
Questions and Answers


What are the two common best principles of software applications in the development process? Choose
2 answers.

Quality code

Secure code

Information security

Integrity

Availability

Quality code

Secure code



"Quality code" is correct. Quality code is efficient code that is easy to maintain and reusable.

"Secure code" is correct. Secure code authorizes and authenticates every user transaction, logs the
transaction, and denies all unauthorized requisitions.




What ensures that the user has the appropriate role and privilege to view data?

Authentication

Multi-factor authentication

Encryption

Information security

Authorization

Authorization



Authorization ensures a user's information and credentials are approved by the system.

,Which security goal is defined by "guarding against improper information modification or destruction
and ensuring information non-repudiation and authenticity"?

Integrity

Quality

Availability

Reliability

Integrity



The data must remain unchanged by unauthorized users and remain reliable from the data entry point
to the database and back.




Which phase in an SDLC helps to define the problem and scope of any existing systems and determine
the objectives of new systems?

Requirements

Design

Planning

Testing

Planning



The planning stage sets the project schedule and looks at the big picture.




What happens during a dynamic code review?

Programmers monitor system memory, functional behavior, response times, and overall performance.

Customers perform tests to check software meets requirements.

An analysis of computer programs without executing them is performed.

Input fields are supplied with unexpected input and tested.

,Programmers monitor system memory, functional behavior, response times, and overall performance.




How should you store your application user credentials in your application database?

Use application logic to encrypt credentials

Store credentials as clear text

Store credentials using Base 64 encoded

Store credentials using salted hashes

Store credentials using salted hashes



Hashing is a one-way process that converts a password to ciphertext using hash algorithms. Password
salting adds random characters before or after a password prior to hashing to obfuscate the actual
password.




Which software methodology resembles an assembly-line approach?

V-model

Agile model

Iterative model

Waterfall model

Waterfall model



Waterfall model is a continuous software development model in which the development steps flow
steadily downwards.




Which software methodology approach provides faster time to market and higher business value?

Iterative model

Waterfall model

V-model

, Agile model

Agile model



In the agile model, projects are divided into small incremental builds that provide working software at
the end of each iteration and adds value to business.




In Scrum methodology, who is responsible for making decisions on the requirements?

Scrum Team

Product Owner

ScrumMaster

Technical Lead

Product Owner



The Product Owner is responsible for requirements/backlog items and prioritizing them.




What is the reason software security teams host discovery meetings with stakeholders early in the
development life cycle?

To determine how much budget is available for new security tools

To meet the development team

To refactor functional requirements to ensure security is included

To ensure that security is built into the product from the start

To ensure that security is built into the product from the start



To correctly and cost-effectively introduce security into the software development life cycle, it needs to
be done early.
Gratis
Krijg toegang tot het volledige document:
Downloaden

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
UniTest Charterhouse School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
7128
Lid sinds
1 jaar
Aantal volgers
6
Documenten
597
Laatst verkocht
18 uur geleden

3,8

19 beoordelingen

5
12
4
0
3
2
2
2
1
3

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen