D487 - Secure Software Design (Section Quizzes & Lesson Knowledge Checks)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/79

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:55 AM on 3/19/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

80 Terms

1
New cards

What are the two common best principles of software applications in the development process?

Quality code & Secure code

2
New cards

What ensures that the user has the appropriate role and privilege to view data?

Authorization

3
New cards

Which security goal is defined by "guarding against improper information modification or destruction and ensuring information non-repudiation and authenticity"?

Integrity

4
New cards

Which phase in an SDLC helps to define the problem and scope of any existing systems and determine the objectives of new systems?

Planning

5
New cards

What happens during a dynamic code review?

Programmers monitor system memory, functional behavior, response times, and overall performance.

6
New cards

How should you store your application user credentials in your application database?

Store credentials using salted hashes

7
New cards

Which software methodology resembles an assembly-line approach?

Waterfall model

8
New cards

Which software methodology approach provides faster time to market and higher business value?

Agile Model

9
New cards

In Scrum methodology, who is responsible for making decisions on the requirements?

Product Owner

10
New cards

What is software security?

Security that deals with securing the foundational programmatic logic of the underlying software.

11
New cards

Which part of the CIA goals keeps unauthorized users from accessing confidential information?

Confidentiality

12
New cards

What are the three primary tools basic to the security development life cycle?

Fuzzing/Fuzz testing, Static analysis testing, and Dynamic analysis testing.

13
New cards

In which phase of the SDLC should the software security team be involved?

Concept

14
New cards

What determines the order of items in a product backlog in Scrum?

Order is decided based on value of the items being delivered.

15
New cards

Why is the Waterfall methodology most useful for smaller projects?

When a project is smaller, the risk of changing requirements and scope is lower.

16
New cards

What is the product risk profile?

A security assessment deliverable that estimates the actual cost of the product.

17
New cards

A software security team member has been tasked with creating a deliverable that provides details on where and to what degree sensitive customer information is collected, stored, or created within a new product offering.

What does the team member need to deliver in order to meet the objective?

Privacy impact assessment.

18
New cards

A software security team member has been tasked with creating a threat model for the login processes of a new product.

What is the first step a team member should take?

Identify security objectives

19
New cards

What are three parts of the STRIDE methodology?

Spoofing, Elevation, and Tampering

20
New cards

What is the reason software security teams host discovery meetings with stakeholders early in the development life cycle?

To ensure that security is built into the product from the start

21
New cards

Why should a security team provide documented certification requirements during the software assessment phase?

Depending on the environment in which the product resides, certifications may be required by corporate or government entities before the software can be released to customers.

22
New cards

What are two items that should be included in the privacy impact assessment plan regardless of which methodology is used?

Required process steps and Technologies and techniques

23
New cards

What are the goals of this SDL deliverable?: Product Risk Profile

Estimate the actual cost of the product

24
New cards

What are the goals of this SDL deliverable?: SDL project outline

Map security activities to the development schedule

25
New cards

What are the goals of this SDL deliverable?: Threat Profile

Guide security activities to protect the product from vulnerabilities

26
New cards

What are the goals of this SDL deliverable?: List of third-party software

Identify dependence on unmanaged software

27
New cards

What is a threat action that is designed to illegally access and use another person’s credentials?

Spoofing

28
New cards

What are two steps of the threat modeling process?

Survey the application and Decompress the application

29
New cards

What do the “A” and the first “D” in the DREAD acronym represent?

Affected users and Damage

30
New cards

Which shape indicates each type of flow diagram element?: External elements

Rectangle

31
New cards

Which shape indicates each type of flow diagram element?: Data store

Two parallel horizontal lines

32
New cards

Which shape indicates each type of flow diagram element?: Data flow

Solid line with an arrow

33
New cards

Which shape indicates each type of flow diagram element?: Trust boundary

Dashed line

34
New cards

What are the two deliverables of the Architecture phase of the SDL?

Threat modeling artifacts and Policy compliance analysis

35
New cards

What SDL security assessment deliverable is sued as ain input to an SDL architecture process?

Threat profile

36
New cards

Which software security testing technique tests the software from an external perspective?

Black box

37
New cards

Which security design principle states that an entity should be given the minimum privileges and resources for a minimum period of time for a task?

Least privilege

38
New cards

After the developer is done coding a functionality, when should code review be completed?

Within hours or the same day

39
New cards

What are the four step orders that code reviews should follow in order to be effective?

  1. Identify security code review objectives.

  2. Perform preliminary scan.

  3. Review code for security issues.

  4. Review for security issues unique to the architecture.

40
New cards

When a software application handles identifiable information (PII) data, what will be the Privacy Impact Rating?

P1: High privacy risk

41
New cards

Which key success factor identifies threats to the software?

Effective threat modeling

42
New cards

What is the goal of design security review deliveriables?

To male modifications to the design of software components based on security assessments

43
New cards

Which application scanner component is useful in identifying vulnerabilities such as cookie misconfigurations and insecure configuration of HTTP response headers?

Passive scanner

44
New cards

Which type of attack occurs when an attacker uses malicious code in the data sent in a form?

Cross-site scripting

45
New cards

Which tools provide the given functions?: Self-managed, automatic code review product

SonarQube

46
New cards

Which tools provide the given functions?: Open-source automation server

Jenkins

47
New cards

Which tools provide the given functions?: Proprietary issue tracking product

JIRA

48
New cards

Which tools provide the given functions?: AI-powered management solution

Dynatrace

49
New cards

A new application is released, and users perform initial testing on the application. Which type of testing are the users performing?

Beta testing

50
New cards

What is a non-system-related component in software security testing attack surface validation?

Users

51
New cards

When an application’s input validation is not handled properly, it could result in which kind of vulnerabilities?

SQL injection, cross-site scripting

52
New cards

What are the advantages of the following security analysis tools?: Static code analysis

Access to the actual instructions the software will be guessing

53
New cards

What are the advantages of the following security analysis tools?: Dynamic code analysis

Tests a specific operational deployment

54
New cards

What are the advantages of the following security analysis tools?: Fuzz testing

Testing in a random approach

55
New cards

What are the advantages of the following security analysis tools?: Manual source code review

Requires no supporting technology

56
New cards

Which activity in the Ship (A5) phase of the security development cycle sets requirements for quality gates that must be met before release?

A5 policy compliance analysis

57
New cards

The company's website uses querystring parameters to filter products by category. The URL, when filtering on a product category, looks like this: company.com/products?category=2.

If the security team saw a URL of company.com/products?category=2 OR 1=1 in the logs, what assumption should they make?

An attacker is attempting to use SQL injection to gain access to information.

58
New cards

Which post-release support activity (PRSA) details the process for investigating, mitigating, and communicating findings when security vulnerabilities are discovered in a software product?

External vulnerability disclosure response

59
New cards

Which post-release support key success factor says that any change or component reuse should trigger security development life cycle activities?

SDL cycle for any architectural changes or code reuses

60
New cards

Which step will you find in the SANS Institute Cyber Defense seven-step recipe for conducting threat modeling and application risk analysis?

Brainstorm threats from adversaries

61
New cards

In which OpenSAMM core practice area would one find environment hardening?

Deployment

62
New cards

Which practice in the Ship (A5) phase of the security development cycle verifies whether the product meets security mandates?

A5 policy compliance analysis

63
New cards

Which post-release support activity defines the process to communicate, identify, and alleviate security threats?

PRSA1: External vulnerability disclosure response

64
New cards

What are two core practice areas of the OWASP Security Assurance Maturity Model (OpenSAMM)?

Governance and Construction

65
New cards

Which practice in the Ship (A5) phase of the security development cycle uses tools to identify weaknesses in the product?

Vulnerability scan

66
New cards

Which post-release support activity should be completed when companies are joining together?

Security architectural reviews

67
New cards

Which of the Ship (A5) deliverables of the security development cycle are performed with the given actions?: A5 Policy compliance analysis

Analyze activities and standards

68
New cards

Which of the Ship (A5) deliverables of the security development cycle are performed with the given actions?: Code-assisted penetration testing

White-box security test

69
New cards

Which of the Ship (A5) deliverables of the security development cycle are performed with the given actions?: Open-source licensing review

License compliance

70
New cards

Which of the Ship (A5) deliverables of the security development cycle are performed with the given actions?: Final security review

Release and ship

71
New cards

How can you establish your own SDL to build security into a process appropriate for your organization's needs based on the given environments?: Agile

Iterative development

72
New cards

How can you establish your own SDL to build security into a process appropriate for your organization's needs based on the given environments?: DevOps

Continuous integration and continuous development

73
New cards

How can you establish your own SDL to build security into a process appropriate for your organization's needs based on the given environments?: Cloud

API invocation processes

74
New cards

How can you establish your own SDL to build security into a process appropriate for your organization's needs based on the given environments?: Digital enterprise

Enables and improves business activities

75
New cards

Which phase of penetration testing allows for remediation to be performed?

Deploy

76
New cards

Which key deliverable occurs during post-release support?

Third-party reviews

77
New cards

Which business function of OpenSAMM is associated with the following core practices?: Governance

Policy and compliance

78
New cards

Which business function of OpenSAMM is associated with the following core practices?: Contruction

Threat assessment

79
New cards

Which business function of OpenSAMM is associated with the following core practices?: Verification

Code review

80
New cards

Which business function of OpenSAMM is associated with the following core practices?: Deployment

Vulnerability management

Explore top notes

note
Data Acquisition
Updated 1073d ago
0.0(0)
note
Oxidative Phosphorylation
Updated 1191d ago
0.0(0)
note
economics
Updated 416d ago
0.0(0)
note
Tools of Foreign Policy
Updated 1241d ago
0.0(0)
note
Art Notes - Sem 2 2024
Updated 507d ago
0.0(0)
note
Lord of the Flies
Updated 707d ago
0.0(0)
note
Data Acquisition
Updated 1073d ago
0.0(0)
note
Oxidative Phosphorylation
Updated 1191d ago
0.0(0)
note
economics
Updated 416d ago
0.0(0)
note
Tools of Foreign Policy
Updated 1241d ago
0.0(0)
note
Art Notes - Sem 2 2024
Updated 507d ago
0.0(0)
note
Lord of the Flies
Updated 707d ago
0.0(0)

Explore top flashcards

flashcards
Latin quiz 1 review
46
Updated 268d ago
0.0(0)
flashcards
GLW #2
20
Updated 180d ago
0.0(0)
flashcards
ETS RC 2023 - TEST 01 PART 5
130
Updated 913d ago
0.0(0)
flashcards
Unit 8: Clinical Psychology
64
Updated 1079d ago
0.0(0)
flashcards
APUSH Midterm
42
Updated 100d ago
0.0(0)
flashcards
Latin quiz 1 review
46
Updated 268d ago
0.0(0)
flashcards
GLW #2
20
Updated 180d ago
0.0(0)
flashcards
ETS RC 2023 - TEST 01 PART 5
130
Updated 913d ago
0.0(0)
flashcards
Unit 8: Clinical Psychology
64
Updated 1079d ago
0.0(0)
flashcards
APUSH Midterm
42
Updated 100d ago
0.0(0)