Lesson 9 Flashcards
BIOS is an example of _____.
BIOS is an example of machine-level software.
Which of the following software development processes follows a linear sequence from initiation and conception to maintenance?
The waterfall model for software development follows a linear sequence from initiation and conception to maintenance.
The _____ development process demonstrates the relationship between each early phase of development and the associated testing phase.
The V-model for software development demonstrates the relationship between each early phase of development and the associated testing phase.
Which of the following software development processes is best for large and complicated projects?
The spiral model for software development is intended for large and complicated projects.
The TJ Maxx hack was due to:
an SQL injection that allowed theft of data following a WEP crack
Agile development:
is a dynamic method that allows for change and uses small teams to develop and process applications quickly.
In programming, the requirements phase is:
the phase that highlights what the program should do.
When working to find secure programming methodologies, programmers should:
use a knowledge management base to avoid known pitfalls and have appropriate libraries against improper coding practices.
The Waterfall method of programming:
The Waterfall method would allow a return to a previous module from its current iterative process.
System auditing of software ensures _____.
A software’s compliance to specifications, quality, industry standards, best practices, and regulations.
A software is secure when _____.
A software is secure when it is developed in a way that its operations and functions continue as normal even when subject to breaches and malicious attacks.
Which of the following records the time stamps of activities of the software?
System Logging
Securing software is important because _____.
Dire consequences can result from vulnerabilities, resulting in high costs of remediation of the damage.
Which of the following security measures best secures data from malicious manipulation?
Data Encoding
What is a failed test?
The actual results do not match the expected results