and Correct Answers | New Update
Building Security In Maturity Model (BSIMM) - 🧠ANSWER ✔✔a study of
real-world software security initiatives organized so companies can
measure their initiatives and understand how to evolve them over time
System configuration - 🧠ANSWER ✔✔secure coding best practice ensures
servers, frameworks, and system components are all running the latest
approved versions
Database security - 🧠ANSWER ✔✔secure coding best practice says to use
parameterized queries, encrypted connection strings stored in separate
configuration files, and strong passwords or multi-factor authentication
Waterfall - 🧠ANSWER ✔✔a sequential, step-by-step process for
requirements
, V-model - 🧠ANSWER ✔✔a variation of the waterfall model, where the
stage is turned back upwards after the coding phase
Scrum - 🧠ANSWER ✔✔flexible, holistic product development strategy
where a development team works as a unit to reach a common goal
extreme programming (XP) - 🧠ANSWER ✔✔a software development
methodology that is intended to improve software quality and
responsiveness
Agile methodology - 🧠ANSWER ✔✔mixes traditional and new software
development practices - has four core values and 12 principles that can be
followed. provides faster time to market and higher business value
ScrumMaster - 🧠ANSWER ✔✔this role in Scrum is responsible for making
sure the team is living by the values and practices of Scrum, similar to the
role of a coach.
Scrum Team - 🧠ANSWER ✔✔(scrum) works together to complete the given
tasks of the project.
project manager (scrum) - 🧠ANSWER ✔✔(scrum) in charge of the project
development, budget, and ensuring the timeline is moving accordingly.