Domain 4 Flashcards

1
Q

common security flaw in API

A

Broken or lack of authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

common format for his team’s software versioning (Common industry standard)

A

major.minor.patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OWASP’S Application Security Verification Standard (ASVS) has three primary usage models

A

To be used as:
Metric
Guidance
to be used during procurement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

dynamic secrets

A

Using dynamic secrets—secrets that are generated and used as they are needed—allows for granular auditing of uses because each secret is created as needed and thus their specific usage can be reviewed as needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ATASM

A

ATASM considers architecture, threats, attack surfaces (not attacks) and mitigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Database Activity Monitor (DAM)

A

A Database Activity Monitor (DAM) solution provides database activity monitoring that includes privileged account usage logging and monitoring in addition to other security and monitoring features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SMS Factors - least secure

A

SMS factors are considered the least secure of these options because of SIM swapping and VoIP-based attacks on SMS messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

XML Firewalls

A

XML firewalls can help improve the security of SAML-based applications by preventing XML-specific attacks

xml injection,
Security-focused code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Interactive application security testing (IAST)

A

Interactive application security testing (IAST) uses software instrumentation to validate performance and function and is typically conducted during the QA/Test phase of the SDLC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SAFECode
Software Assurance Forum for Excellence in Code (SAFECode).

A

Changing encryption algorithms if a problem is found with one that is currently in use is actually a best practice that SAFECode recommends. They call it “cryptographic agility” and note that you need to be able to transition to new mechanisms, libraries, and keys when needed. Defining what to protect, what mechanisms will be used, and how keys and certificates will be managed are all common best practices and are also recommended by SAFECode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Abuse Case Testing

A

Abuse case testing will test how users could abuse the software, including the type of issues James is concerned about. White box, or full knowledge, testing and black box, or zero knowledge, testing both describe the amount of information that testers have about the environment, and use case testing validates how software is supposed to be used, not how it could be abused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If containers currently run as root.
Remediation

A

Setting a nonprivileged user as the process owner will work in many cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly