Domain 8 - Software Development Security Flashcards

1
Q

What do the following steps describe?

  1. Requirements
  2. Software design
  3. Implementation
  4. Testing
  5. Integration (if there are multiple subsystems)
  6. Deployment
  7. Maintenance
A

Waterfall Methodology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Requirements and solutions evolve via collaboration between self organizing cross functional teams, that use a process incorporating continuous feedback to successively refine and deliver a software system

A

Agile, Agile Scrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Takes key aspects of the waterfall model and rapid prototyping methodologies in an effort to combine advantages of top down and bottom up concepts

  1. Determine Objectives
  2. Identify & Resolve Risk
  3. Develop & Test
  4. Plan next iteration
A

Spiral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multi step, iterative process, structured in a methodical way. Used to model or provide a framework for technical and non technical activities to deliver a quality system which meets and/or exceeds expectations

A

SDLC - Software Development Life Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe how the system OR software works

A

NON FUNCTIONAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe what the system OR software should do

A

FUNCTIONAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Main focus of the project managers and stakeholders. Meetings with managers, stake holders and users are held in order to determine the requirements.

A

Requirements gathering and Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True / False

You should NOT test with live production data.

A

True

You can test with sanitized production data but never live production data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True / False

Certification must come before Accreditation. However you can Certify without Accrediting.

A

True

In order to Accredit, you must certify!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These five levels represent what, in regards to Maturity Models?

  1. Initial - Process is not standardized
  2. Managed - Process is characterized for projects but is often reactive
  3. Defined - Process is characterized for the organization and is proactive
  4. Quantitatively Managed - process is measured and controlled
  5. Optimizing - Focus on process improvement
A

Five Stages of CMMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Aims at shorter development cycles, increased deployment frequency and more dependable releases, in close alignment with business objectives.

A

DevOps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These five levels represent what, in regards to Maturity Models?

  1. Initial - Chaos and Disorganization
  2. Repeatable - Life cycle processes are introduced
  3. Defined - Formal, documented processes
  4. Managed - quantitative measurement and software quality
  5. Optimizing - continuous improvement
A

Five Stages of SW-CMM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

These five levels represent what, in regards to Maturity Models?

  1. Initiating - Requirements gathering and resources
  2. Diagnosing - Current state definition and change recommendations
  3. Establishing - Plan (s) to address change recommendations
  4. Acting - develop, test, refine and implement
  5. Learning - continuous improvement
A

Five Stages of IDEAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Used as a project scheduling tool to calculate standard deviation SD for Risk Assessment

A

PERT - Program Evaluation Review Technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Also known as “Data Hiding”

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does these steps refer to?

a. Categorize Information System
b. Select Security Controls
c. Implement Security controls
d. Assess Security Controls
e. Authorize Information System
f. Monitor Security Controls

A

RMF

NIST 800-37R2

17
Q

What do the following represent?

a. Error & Exception handling
b. Code Repos
c. Third party code
d. Code signing

A

Secure Coding Practices

18
Q

Attribute or set of attributes that uniquely identifies a specific instance of an entity.

Each table in a database must contain a _______ that is unique to that table

A

Primary Key

19
Q

an attribute that is a unique identifier within a given table.

A

Candidate Key