D487 Secure Software Design: Roles, Models, Lifecycle & Vulnerabilities Questions With complete verified solutions already graded A+(PASS GUARANTEED)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

Scrum Master

Facilitator, removes roadblocks, runs ceremonies.

2
New cards

Product Owner

Defines requirements, prioritizes backlog, voice of the customer.

3
New cards

Software Developer

Writes code, implements features, follows secure practices.

4
New cards

Quality Assurance Analyst

Tests the software for bugs, ensures it meets requirements.

5
New cards

Software Security Architect

Designs secure frameworks, coding standards.

6
New cards

Security Champion

Promotes security awareness inside dev team, bridge between devs and security team.

7
New cards

Access Control

Who can enter/do what (MFA, RBAC, least privilege).

8
New cards

Database Security

Protect the data (parameterized queries, encrypted connection strings).

9
New cards

File Management

Safe file handling (validate uploads, restrict types/sizes).

10
New cards

Session Management

Control user sessions (timeouts, cookies, prevent hijacking).

11
New cards

BSIMM

Descriptive, benchmarks real org practices.

12
New cards

SAMM

Prescriptive, guides what you should do.

13
New cards

STRIDE

Threat categories (Spoofing, Tampering, Repudiation, Info Disclosure, DoS, Elevation of Privilege).

14
New cards

DREAD

Risk scoring (Damage, Reproducibility, Exploitability, Affected users, Discoverability).

15
New cards

PASTA

7-step attack simulation methodology.

16
New cards

A1 - Security Assessment

Profiles & paperwork (risk profile, laws, regulations).

17
New cards

A2 - Architecture

Blueprint + threat model (DFDs, mitigation plan).

18
New cards

A3 - Design & Development

Plans & updates (test plan, privacy assessment).

19
New cards

A4 - Readiness

Proof reports (testing execution + remediation).

20
New cards

A5 - Ship

Final stamp (pen test, reviews, licensing, customer prep).

21
New cards

PRS - Post-Release Support

Ongoing support (disclosures, certifications, legacy plans).

22
New cards

CVE System

IDs and shares known vulnerabilities so teams can recognize and patch.

23
New cards

Waterfall Methodology

Pros = structured/simple. Cons = inflexible.

24
New cards

Agile Methodology

Pros = flexible, collaborative. Cons = unpredictable, requires communication.

25
New cards

Privacy Impact Assessment

What data is collected, how it's used, risks, safeguards.

26
New cards

Code Review

Check code for bugs, logic errors, and insecure practices.

27
New cards

Change Management

Propose → Assess → Approve → Implement → Test → Document.

28
New cards

Pen Testing vs Vulnerability Scanning

Scanning = find weaknesses, Pen test = exploit them.

29
New cards

SQL Injection

Parameterized queries.

30
New cards

XSS

Output encoding.

31
New cards

File Upload Issues

Input validation.

32
New cards

Weak Passwords

Complexity + MFA.

33
New cards

Default Configurations

Change defaults, disable accounts.

34
New cards

Configuration Management Countermeasures

Limit service account privileges (no admin rights).

35
New cards

Post-Release Support (PRSA1-5)

Even after software is released, security and privacy must be managed.

36
New cards

PRSA1 - External Vulnerability Disclosure Response (PSIRT)

Manage vulnerabilities reported by researchers/customers, use severity scoring (CVSS), coordinated disclosure.

37
New cards

PRSA2 - Third-Party Reviews

Independent audits/pen tests required by regulators/customers.

38
New cards

PRSA3 - Post-Release Certifications

HIPAA, PCI DSS, FIPS 140-2, etc. after release.

39
New cards

PRSA4 - Internal Review for New Uses/Cloud Deployments

Reused/re-architected code must go through SDL again.

40
New cards

PRSA5 - Legacy & M&A Security Reviews

Review legacy code (technical debt), evaluate acquired products (binary/static analysis).

41
New cards

Key Success Factors

Clear vulnerability response process, annual third-party reviews, early certification planning, strategies for legacy & M&A code.

42
New cards

Deliverables

Vulnerability response plan, third-party review reports, post-release certifications, legacy/M&A strategies.

43
New cards

Metrics

Time to respond, hours spent on disclosures, number/severity of issues, customer-reported problems.