EXAM 2025/2026 COMPLETE QUESTIONS WITH
VERIFIED CORRECT ANSWERS || 100%
GUARANTEED PASS.
1. What are the two common best principles of software applications in the
development process? Choose 2 answers.
Quality code Secure
code Information
security Integrity
Availability: Quality code
Secure code
"Quality code" is correct. Quality code is efficient code that is easy to maintain and
reusable.
"Secure code" is correct. Secure code authorizes and authenticates every user transaction
logs the transaction, and denies all unauthorized requisitions.
2. What ensures that the user has the appropriate role and privilege to view data?
Authentication
Multi-factor authentication
mailto:https://www.stuvia.com/user/Wisdoms
, Encryption
Information security Authorization:
Authorization
Authorization ensures a user's information and credentials are approved by the system.
3. Which security goal is defined by "guarding against improper information
modification or destruction and ensuring information non-repudiation and
authenticity"?
Integrity Quality
Availability
Reliability: Integrity
The data must remain unchanged by unauthorized users and remain reliable from the
data entry point to the database and back.
4. Which phase in an SDLC helps to define the problem and scope of any existing
systems and determine the objectives of new systems? Requirements
Design
Planning
Testing: Planning
mailto:https://www.stuvia.com/user/Wisdoms
, The planning stage sets the project schedule and looks at the big picture.
5. What happens during a dynamic code review?
Programmers monitor system memory, functional behavior, response times, and overall
performance.
Customers perform tests to check software meets requirements.
An analysis of computer programs without executing them is performed. Input fields are
supplied with unexpected input and tested.: Programmers mon- itor system memory,
functional behavior, response times, and overall performance.
6. How should you store your application user credentials in your application database?
Use application logic to encrypt credentials Store
credentials as clear text
Store credentials using Base 64 encoded
Store credentials using salted hashes: Store credentials using salted hashes
Hashing is a one-way process that converts a password to ciphertext using hash
algorithms. Password salting adds random characters before or after a password prior
to hashing to obfuscate the actual password.
7. Which software methodology resembles an assembly-line approach? V-model
Agile model
Iterative model
Waterfall model: Waterfall model
Waterfall model is a continuous software development model in which the develop- ment
steps flow steadily downwards.
mailto:https://www.stuvia.com/user/Wisdoms
, 8. Which software methodology approach provides faster time to market and higher
business value?
Iterative model
Waterfall model
V-model
Agile model: Agile model
In the agile model, projects are divided into small incremental builds that provide working
software at the end of each iteration and adds value to business.
9. In Scrum methodology, who is responsible for making decisions on the
requirements?
Scrum Team
mailto:https://www.stuvia.com/user/Wisdoms