2025 Objective Exam (Versions A & B) |
Verified Questions with 100% Accurate
A+ Answers
Privacy compliance report
Which design and development deliverable details the progress of personal information
requirements created in earlier phases of the security development lifecycle?
Updated threat modeling artifacts
Which design and development deliverable contains technical and executive-level reports
detailing any newly identified vulnerabilities?
C++
,_______ is highly susceptible to buffer overflow vulnerabilities because it allows direct
memory access and pointer arithmetic without built-in safeguards like bounds checking. This
makes it a common target for memory corruption attacks.
Identify security code review objectives
What is the first step of the SDLC/SDL code review process?
Functional testing
Software testing performed when an analyst executes a series of test cases based on application
requirements.
Ensure server-side queries are parameterized
A method to adjust existing security controls to prevent SQL injection vulnerabilities.
Ensure third party libraries are kept up to date and reviewed consistently
A measure to adjust existing security controls after discovering a vulnerability in a third-party
logging tool.
Validate all user input
A security control adjustment to prevent unauthorized file uploads.
Remediation of database instances
Addressing vulnerabilities discovered during an organizational security review of multiple
database instances installed with default settings.
Default accounts and passwords
,Ensure default accounts and passwords are disabled or removed
Auditing and logging
Ensure auditing and logging is enabled on all servers
Access to configuration files
Ensure access to configuration files is limited to administrators
Server information exposure
Ensure servers are configured to return as little information as possible to network requests
DOM-based cross-site scripting vulnerability
Enforce encoding of special characters
Data encryption in transit
Ensure all data is encrypted in transit
Audit trails for sensitive transactions
Ensure audit trails exist for all sensitive transactions
Principle of least privilege
Follow the principle of least privilege for user and system accounts
Simple hashes for passwords
Enforce the use of strong, salted hashing functions when storing passwords
, Strong password complexity standards
Enforce strong password complexity standards
Regular password updates
Enforce regular password updates
Encryption on credentials in transit
Enforce encryption on credentials in transit
User privileges after exceptions
Ensure user privileges are restored to the appropriate level after exceptions
Centralized exception handling
Ensure exceptions are handled in a centralized, structured way
Error message sensitivity
Ensure error messages are scrubbed of any sensitive information
Audit log for sensitive transactions
Ensure there is an audit log for all sensitive transactions
Response to credible vulnerabilities
Identify resources and schedule the fix
Ownership of product vulnerabilities