8-60.1 Software Security Assessment Flashcards
1
Q
Objective of this assessment is to identify known weaknesses and exposures
A
Vulnerability Assessment
2
Q
This type of assessment checks against guidance, best practices, and applicable standards
A
Configuration Assessment
3
Q
The term used to describe the level of risk after controls have been applied
A
Residual Risk
4
Q
An independent review of application functionality and effectiveness
A
Application Audit
5
Q
The type of attack exploits a software vulnerability to obtain higher level priviliges
A
Privilege escalation