Exam 3 Leftovers Flashcards

1
Q

5 steps in SDLC?

A
Initiate 
Acquire/ Develop
Implement 
Operate/ Maintain 
Dispose
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
In which development stage is code actually written?
Initiate 
Acquire/ Develop
Implement 
Operate/ Maintain 
Dispose
A

Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which initiative was developed by Homeland Security?
WASC
BSI
OWASP
ISO
A

BSI(Build Security In)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following development models includes no formal control mechanisms to provide feedback?
Waterfall
V-Shaped
Build and Fix
Spiral
A

Build and Fix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which language type delivers instructions directly to the processor?
Assembly languages
High-level languages
Machine languages 
Natural languages
A

Machine languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which term describes how many different tasks a module can carry out?
Polymorphism 
Cohesion 
Coupling
Data structures
A

Cohesion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which term describes a standard for communication between processes on the same computer?
COBRA
DCOM
COM
SOA
A

COM(component Object Model)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following is a Microsoft technology?
ActiveX
Java
SOA
COBRA
A

ActiveX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following is the dividing line between the trusted parts of the system and those that are untrusted?
Security perimeter 
Reference monitor 
Trusted Computer Base
Security Kernel
A

Security Perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following is a system component that enforces access controls on an object?
Security perimeter 
Reference monitor 
Trusted Computer Base
Security Kernel
A

Reference monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following ensures that the customer(internal or external) is satisfied with the functionality of the software?
Integration testing 
Acceptance testing
Regression testing
Accreditation
A

Acceptance testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
In which of the following models is less time spent on the upfront analysis and more emphasis placed on learning from the process feedback and incorporating lessons learned in real time?
Agile
Rapid Application Development 
Cleanroom 
Modified Waterfall
A

Agile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following software development risk analysis and mitigation strategy guidelines should security professionals follow?(Choose all that apply)
Integrate risk and mitigation in the SDLC
Use qualitative, quantitative, and hybrid risk analysis approaches based on standardized risk analysis methods
Track and manage weaknesses that are discovered throughout risk assessment, change management, and continuous monitoring
Encapsulate data to make it easier to apply the appropriate policies to objects

A

A,B,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following are valid guidelines for providing API security?
Use the same security controls for APIs as any web application on the enterprise
Use hash-based message authentication Code
Use encryption when passing static keys
Implement password encryption instead of single key-based authentication

A

All of em

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following is NOT one of the four phases of acquiring software?
Planning
Contracting
Development
Monitoring an accepting
A

Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly