Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Secure-Software-Design Questions and Answers

Question # 6

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the user authentication component of the company's now product. The base score of the vulnerability was 8.3 and changed to 9.4 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

A.

High seventy

B.

Critical severity

C.

Medium severity

D.

Low seventy

Full Access
Question # 7

Which secure coding best practice ensures sensitive information is not disclosed in any responses to users, authorized or unauthorized?

A.

Input validation

B.

System configuration

C.

Authentication and password management

D.

Error handling and logging

Full Access
Question # 8

Which category classifies identified threats that have some defenses in place and expose the application to limited exploits?

A.

Fully Mitigated Threat

B.

Unmitigated Threats

C.

Threat Profile

D.

Partially Mitigated Threat

Full Access
Question # 9

The software security team prepared a report of necessary coding and architecture changes identified during the security assessment.

Which design and development deliverable did the team prepare?

A.

Updated threat modeling artifacts

B.

Security test plans

C.

Privacy implementation assessment results

D.

Design security review

Full Access
Question # 10

Which architecture deliverable identifies the organization's tolerance to security issues and how the organization plans to react if a security issue occurs?

A.

Threat Modeling Artifacts

B.

Risk Mitigation Plan

C.

Business Requirements

D.

Policy Compliance Analysis

Full Access
Question # 11

What are the eight phases of the software development lifecycle (SDLC)?

A.

Planning, security analysis, requirement analysis, design, implementation, threat mitigation, testing, maintenance

B.

Planning, requirements, design, implementation, testing, deployment, maintenance, end of life

C.

Plan, gather requirements, identify attack surface, design, write code, perform code reviews, test, deploy

D.

Gather requirements, prototype, perform threat modeling, write code, test, user acceptance testing, deploy, maintain

Full Access
Question # 12

In which step of the PASTA threat modeling methodology will the team capture infrastructure, application, and software dependencies?

A.

Attack modeling

B.

Define technical scope

C.

Define objectives

D.

Risk and impact analysis

Full Access
Question # 13

Automated security testing was performed by attempting to log in to the new product with a known username using a collection of passwords. Access was granted after a few hundred attempts.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure passwords are encrypted when stored in persistent data stores

B.

Ensure authentication controls are resistant to brute force attacks

C.

Ensure strong password policies are enforced

D.

Ensure credentials and authentication tokens are encrypted during transit

Full Access
Question # 14

Which privacy impact statement requirement type defines processes to keep personal information updated and accurate?

A.

Access requirements

B.

Collection of personal information requirements

C.

Data integrity requirements

D.

Personal information retention requirements

Full Access
Question # 15

The organization has contracted with an outside firm to simulate an attack on the new software product and report findings and remediation recommendations.

Which activity of the Ship SDL phase is being performed?

A.

Penetration testing

B.

Policy compliance analysis

C.

Open-source licensing review

D.

Final security review

Full Access
Question # 16

Which type of security analysis is performed by reviewing source code line-by-line after other security analysis techniques have been executed?

A.

Dynamic Analysis

B.

Static Analysis

C.

Manual Code Review

D.

Fuzz Testing

Full Access
Question # 17

The software security team prepared a detailed schedule napping security development lifecycle phases to the type of analysis they will execute.

Which design and development deliverable aid the team prepare?

A.

Design security review

B.

Updated threat modeling artifacts

C.

Privacy implementation assessment results

D.

Security test plans

Full Access
Question # 18

Which security assessment deliverable defines measures that can be periodically reported to management?

A.

Metrics Template

B.

SDL Project Outline

C.

Threat Profile

D.

Product Risk Profile

Full Access
Question # 19

The security team has received notice of an insecure direct object reference vulnerability in a third-party component library that could result in remote code execution. The component library was replaced and is no longer being used within the application.

How should the organization remediate this vulnerability?

A.

Ensure Sensitive Information Is Not Logged

B.

Ensure Auditing and Logging Is Enabled on All Servers

C.

Access to Configuration Files Is Limited to Administrators

D.

Enforce the Removal of Unused Dependencies

Full Access
Question # 20

What is the last slop of the SDLOSDL code review process?

A.

Review for security issues unique to the architecture

B.

Identify security code review objectives

C.

Perform preliminary scan

D.

Review code for security issues

Full Access
Question # 21

A legacy application has been replaced by a new product that provides mobile capabilities to the company's customer base. The two products have run concurrently for the last three months to provide a fallback if the new product experienced a large-scale failure. The time has come to turn off access to the legacy application.

Which phase of the Software Development Life Cycle (SDLC) is being described?

A.

End of Life

B.

Design

C.

Maintenance

D.

Planning

Full Access
Question # 22

While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure no sensitive information is stored in plain text in cookies

B.

Ensure user sessions timeout after short intervals

C.

Ensure role-based access control is enforced for access to all resources

D.

Ensure strong password policies are enforced

Full Access
Question # 23

Which step in the change management process includes modifying the source code?

A.

Patch management

B.

Installation management

C.

Privacy implementation assessment

D.

Policy compliance analysis

Full Access
Question # 24

Due to positive publicity from the release of the new software product, leadership has decided that it is in the best interests of the company to become ISO 27001 compliant. ISO 27001 is the leading international standard focused on information security.

Which security development life cycle deliverable is being described?

A.

External vulnerability disclosure response process

B.

Third-party security review

C.

Security strategy for M&A products

D.

Post-release certifications

Full Access
Question # 25

Which category classifies identified threats that have defenses in place and do not expose the application to exploits?

A.

Threat Profile

B.

Fully Mitigated Threat

C.

Partially Mitigated Threat

D.

Unmitigated Threats

Full Access
Question # 26

Which software-testing technique can be automated or semi-automated and provides invalid, unexpected, or random data to the inputs of a computer software program?

A.

Fuzzing

B.

Static analysis

C.

Dynamic analysis

D.

Bugtraq

Full Access
Question # 27

Which SDL security goal is defined as ensuring timely and reliable access to and use of information?

A.

Information security

B.

Confidentiality

C.

Availability

D.

Integrity

Full Access
Question # 28

Which secure coding best practice says to use well-vetted algorithms to ensure that the application uses random identifiers, that identifiers are appropriately restricted to the application, and that user processes are fully terminated on logout?

A.

Output Encoding

B.

Input Validation

C.

Access Control

D.

Session Management

Full Access
Question # 29

What is an advantage of using the Agile development methodology?

A.

Customer satisfaction is improved through rapid and continuous delivery of useful software.

B.

Each stage is clearly defined, making it easier to assign clear roles to teams and departments who feed into the project.

C.

The overall plan fits very neatly into a Gantt chart so a project manager can easily view the project timeline.

D.

There is much less predictability throughout the project regarding deliverables.

Full Access
Question # 30

During penetration testing, an analyst was able to create hundreds of user accounts by executing a script that sent individual requests to the registration endpoint.

How should the organization remediate this vulnerability?

A.

Use a Tool Like CAPTCHA to Prevent Batched Registrations and Bots

B.

Enforce Strong Password Complexity Standards

C.

Enforce Idle Time-Outs on Session IDs

D.

Ensure All Data Is Encrypted in Transit

Full Access
Question # 31

Developers have finished coding, and changes have been peer-reviewed. Features have been deployed to a pre-production environment so that analysts may verify that the product is working as expected.

Which phase of the Software Development Life Cycle (SDLC) is being described?

A.

Requirements

B.

Design

C.

Testing

D.

Deployment

Full Access
Question # 32

A product team, consisting of a Scrum Master, a Business Analyst, two Developers, and a Quality Assurance Tester, are on a video call with the Product Owner. The team is reviewing a list of work items to determine how many they feel can be added to their backlog and completed within the next two-week iteration.

Which Scrum ceremony is the team participating in?

A.

Daily Scrum

B.

Sprint Planning

C.

Sprint Retrospective

D.

Sprint Review

Full Access
Question # 33

Which category classifies identified threats that do not have defenses in place and expose the application to exploits?

A.

Fully mitigated threat

B.

Threat profile

C.

Unmitigated threats

D.

Partially mitigated threat

Full Access