View all detail and faqs for the Secure-Software-Design exam
Which type of security analysis is performed by reviewing source code line-by-line after other security analysis techniques have been executed?
In which step of the PASTA threat modeling methodology is vulnerability and exploit analysis performed?
While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.
How should existing security controls be adjusted to prevent this in the future?
What is an advantage of using the Agile development methodology?
Which secure coding best practice says to use well-vetted algorithms to ensure that the application uses random identifiers, that identifiers are appropriately restricted to the application, and that user processes are fully terminated on logout?
The security team is identifying technical resources that will be needed to perform the final product security review.
Which step of the final product security review process are they in?
Which SDL security goal is defined as ensuring timely and reliable access to and use of information?
The software security team is performing security testing for a new software product that is close to production release. They are concentrating on integrations between the new product and database servers, web servers, and web services.
Which security testing technique is being used?
The Chief Information Security Officer (CISO) has recommended contracting with external experts to perform annual reviews of the enterprise's software products, including penetration testing.
Which post-release deliverable is being described?
The product development team is preparing for the production deployment of recent feature enhancements. One morning, they noticed the amount of test data grew exponentially overnight. Most fields were filled with random characters, but some structured query language was discovered.
Which type of security development lifecycle (SDL) tool was likely being used?