Lesson 9 Flashcards

1
Q

BIOS is an example of _____.

A

BIOS is an example of machine-level software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following software development processes follows a linear sequence from initiation and conception to maintenance?

A

The waterfall model for software development follows a linear sequence from initiation and conception to maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The _____ development process demonstrates the relationship between each early phase of development and the associated testing phase.

A

The V-model for software development demonstrates the relationship between each early phase of development and the associated testing phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following software development processes is best for large and complicated projects?

A

The spiral model for software development is intended for large and complicated projects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The TJ Maxx hack was due to:

A

an SQL injection that allowed theft of data following a WEP crack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Agile development:

A

is a dynamic method that allows for change and uses small teams to develop and process applications quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In programming, the requirements phase is:

A

the phase that highlights what the program should do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When working to find secure programming methodologies, programmers should:

A

use a knowledge management base to avoid known pitfalls and have appropriate libraries against improper coding practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Waterfall method of programming:

A

The Waterfall method would allow a return to a previous module from its current iterative process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

System auditing of software ensures _____.

A

A software’s compliance to specifications, quality, industry standards, best practices, and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A software is secure when _____.

A

A software is secure when it is developed in a way that its operations and functions continue as normal even when subject to breaches and malicious attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following records the time stamps of activities of the software?

A

System Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Securing software is important because _____.

A

Dire consequences can result from vulnerabilities, resulting in high costs of remediation of the damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following security measures best secures data from malicious manipulation?

A

Data Encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a failed test?

A

The actual results do not match the expected results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who normally performs Business Level Testing?

A

Business Analysts and/or testers

17
Q

What type of testing checks that all modules can communicate with each other?

A

System Testing

18
Q

What is the term used to describe the first type of testing that is done by developers?

A

Unit Testing

19
Q

What type of testing is performed immediately before deployment?

A

Formal Acceptance Testing

20
Q

Which of the following statements is TRUE?

A

During coding it is imperative that secure coding standards and guidelines are strictly adhered to in order to prevent known high-risk vulnerabilities.

21
Q

Which of the following does NOT enhance the security environment in software development?

A

Tainted Input Data

22
Q

Why is security important in ensuring safe software is developed?

A

Security in software development forms one of the main foundation pillars for successful software. Security ensures the designing, building and testing the software is done in a proactive manner that enables the software to prevent problems and attacks automatically.

23
Q

The earliest stage at which security should be factored into the development of safe software is the _____ stage.

A

This entails defining the general details and scope of the software. The scope of the project will be key in determining the most common threats and associated vulnerabilities that need to be protected against.

answer: planning

24
Q

At which stage is Static Code Analysis important?

A

Maintenance phase always involves tweaking old code and adding new code. As such an initial code quality and secure baseline are established post development. Static tools are used to constantly scan new/edited code using the baseline to resolve any consequent issues.

answer: maintenance

25
Q

Which of the following software development processes follows a linear sequence from initiation and conception to maintenance?

A

Waterfall

26
Q

What is an operating system?

A

A software layer to create an environment for programmers

27
Q

Vulnerability Scanning involves _____.

A

scanning for open ports and network enumeration tests.

28
Q

Which of the following statement is FALSE with regards to the importance of Software Security Testing?

A

It gathers basic information about the software and its structures.

29
Q

Areas of weakness
The role of software testing in cybercrime

A