SG Flashcards

1
Q

In information security, confidentiality “is the property, that information is not made available or disclosed to unauthorized individuals, entities, or processes”

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In information security, data integrity means maintaining and assuring the accuracy and completeness of data over its entire life-cycle. This means that data cannot be modified in an unauthorized or undetected manner. This can be also used to validate databases to make sure none of the data is corrupt or modified in an unauthorized matter.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For any information system to serve its purpose, the information must be available when it is needed. This
means that the computing systems used to store
and process the information, the security controls used to protect it, and
the communication channels used to access it must be functioning correctly.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Public Key Infrastructure (PKI) and Cryptography/Encryption is considered to fall under (C,I, or A)?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Offsite back-up and Redundancy is considered to fall under (C,I, or A)?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hashing, Message Digest (MD5), non repudiation and digital signatures is considered to fall under (C,I, or A)?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The software architect moves analysis to implementation and analyzes the requirements and use
cases
as activities to perform as part of the development process.
That person can also
develop class diagrams.

A

Software Architect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Practitioner Roles:
Choose function for each role from the list below:
Coding, Deployment, Requirements Gathering, or Design.

Release Manager
Architect
Developer
Business Analyst/Project Manager

A

Release Manager: Deployment
Architect: Design
Developer: Coding
Business Analyst/Project Manager: Requirements Gathering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These are teams of people familiar with the infrastructure of the company and the languages of the software
being developed. Their mission is to kill the system as the developers build it.

A

Red Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Static analysis
, also called
static
code
analysis
, is a method of computer program debugging that is done
by examining the code without executing the program. The process provides an understanding of the code structure, and
can help to ensure that the code adheres to industry standards.
It’
s also referred as code review.

A

Static Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The
MD5 algorithm
is a widely used hash function producing a 128
-
bit hash value. Although MD5 was
initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities. I
t
can still be used as a checksum to verify data i
ntegrity, but only against unintentional corruption.
(Integrity)

A

MD5 Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
The 
SHA
(Secure Hash Algorithm) is one of a number of cryptographic hash functions. A cryptographic hash 
is like a signature for a text or a data file. 
SHA
-
256
algorithm generates a
n almost
-
unique, fixed size 
256
-
bit (32
-
byte) 
hash. Hash is a one
-
way function 
–
it cannot be decrypted back.
(Integrity)
A

SHA-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
AES
(acronym of 
Advanced Encryption Standard
) is a symmetric 
encryption
algorithm. The algorithm 
was developed by two Belgian cryptographer Joan Daemen and Vincent Rijmen. 
AES
was 
designed to be efficient in both hardware and software, and supports a block length of 128 bits and key lengths of 128, 
192, and 256 bits.
(Confidentiality)
A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
The
analogy between safety and security is particularly close. The main difference is that safety
-
relevant 
faults are stochastic (
i.e.
, unintentional or accidental), whereas security
-
relevant faults are “sponsored,” 
i.e.
, intentionally 
created and activated t
hrough conscious and intentional human agency
.
A

Stochastic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is used to see if the system has solid exception handling to the input it receives. Is the use of malformed or
random input into a system in order to intentionally produce failure
. This is a ver
y easy process of feeding garbage to the
system when it expects a formatted input, and it is always a good idea to feed as much garbage as possible to an input
field.

A

Fuzz Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The 3 tier architecture model removes the business logic from the client
end of the system. It generally
places the business logic on a separate server from the client. The data access portion of the system resides on a 3rd tier,
which is separate from both the client and the business logic platform.

A

Three (3) Tier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

USC’s Threat Model
ing based on Attacking Path analysis (T
-
MAP) is a risk management approach that
quantifies total severity weights of relevant attacking paths for COTS
-
based systems. T
-
MAP’s strengths lie in its ability
to maintain sensitivity to an organization’s business
value priorities and Information Technology (IT) environment, to
prioritize and estimate security investment effectiveness and evaluate performance, and to communicate executive
-
friendly vulnerability details as threat profiles to help evaluate cost effic
iency.

A

MAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Trike is an open source conceptual framework, methodology, and toolset designed to autogenerate repeatable
threat models. Its methodology enables the risk analyst to accurately and completely describe the security characteristics
of the syst
em, from high
-
level architecture to low
-
level implementation of details. It also requires building a defensive
model of the subject system
.

A

Trike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This free tool assists in the creation of threat models. It builds on Microsoft Visio and
provides a tool for constructing graphic representation of threat models for the system without requiring expertise in
security and also has the capability of graphi
cally representing a software system and identifying vulnerabilities.

A

SDL Threat Modeling Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The overall goal of performing vulnerability mapping is to determine the most likely locations within the system in
development where an attacker will strike.
Th
is is done on the design phase of the SDLC

A

Vulnerability Mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This is the
highest level of vulnerability.
This is a very likely target for an attacker, such as free text input in a form.
These are the highest
priory for a security plan for the system and these should al
l be mitigated and accounted for by
established control systems in development.

A

V3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This is the moderate level vulnerability. These are possible but not probable targets. These will include interprocess
communications on the server or traffic within the t
rust boundary of the system. Eavesdropping is the most significant risk
in this situation. V2 level vulnerabilities should always be mitigated in the system, but in a trade off analysis, strict con
trol
may not be necessary as long as a procedure is in plac
e to fail safely and protect any private or confidential data

A

V2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This is the lowest priority level of vulnerability. These are unlikely venues of attack with little risk if they are
exploited. Failing safely is the most important concern at this level,
because the data associated with this vulnerability has
no value, and the process involved is not mission critical. An example of this level of vulnerability
would be a
transmission failure in a common HTML header coming from the system; the highest risk h
ere is that the customer will
not properly see the page and it would have to be reloaded. V1 vulnerabilities can largely be ignored, but they should be
noted in the system specification in case functionality is altered by a later system update or interacti
on because this may
allow them to become more significant.

A

V1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Is capable of expressing resolution efforts to malformed input and potential attacks in a way other
documentation at the system level cannot. The caveat is that activity diagrams
do not contain class calls and references;
they only provide a visualization of the process logic.

A

Activity Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The Kiviat
diagram provides a visual comparison of multiple attributes and can visualize and report the
information on a single artifact based on monitored information.

A

Kiviat Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Is a threat model process that al
lows the company to identify the part that
needs to be protected from
unauthorized users.

A

Identify the Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

D
escribes a set of principles for software development under which requirements and solutions evolve
through the collaborative effort of self
-
organizing cross
-
functional teams. It promotes adapt
ive planning, evolutionary
development, early delivery, and continuous improvement, and it encourages rapid and flexible response to change.
These
principles support the definition and continuing evolution of many software development methods.
It also avoi
ds life
cycle activities and focuses on built a little, test a little and field a little.
It also supports informal communication and
Incremental design.

A

Agile

Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Software Development Models attributes:
Cyclical Process, Supports quick prototyping and limits
the time spent thinking about the problem as a whole. This describes what Software Development Model?

A

Agile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Software Development Models attributes:
Similar to interactive model and main components are planning, development and deployment. This describes what Software Development Model?

A

Waterfall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

located developers working
on systems that are
not life
-
critical. The Crystal family of methodologies focus on efficiency and habitability as components of project safety.
Crystal Clear focuses on people, not processes or artifacts.
Roles may be filed by the same people, including
a project
manager and a business expert.

A

Chrystal Clear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
The 
waterfall model
is a sequential (non
-
iterative
/ Limited Interaction
) design process, used in software 
development processes, in which progress is seen as flowing steadily downwards (like a waterfall)
through the phases of 
conception, initiation, analysis, design, construction, testing, production/implementation and maintenance. All the 
requirements will be specified in the 1st step, uses a document driven approach
(Large Amount of documentation)
and h
as 
specific and identifiable stages.
It also provides a resource to entry level developers with limited exposure.
A

Waterfall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Waterfall Methodology Security concerns:

Requirement Analysis:

A

Define Security Features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Waterfall Methodology Security concerns:

Design:

A

Misuse cases and vulnerability mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Waterfall Methodology Security concerns:

Construction and Implementation:

A

Secure Coding practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Waterfall Methodology Security concerns:

Testing:

A

Penetration Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Waterfall Methodology Security concerns:

Installation:

A

Final Security Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Waterfall Methodology Security concerns:

Operation or Maintenance:

A

Periodic security review and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A
digital signature
is a mathematical scheme for demonstrating the authenticity of a digital message
or documents. A valid digital signature gives a recipient reason to believe that the message was created by a known
sender, that the sender cannot deny having sent the messag
e (authentication and non
-
repudiation), and that the message
was not altered in transit (integrity).
It also can be used as proof of approval by an authorized user.

A

Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

D
ata redundancy
is the existence of data that is additional to the actual data
and permits correction of errors
in stored or transmitted data. The additional data can be simply a complete copy of the actual data, or only select pieces of
data that allow detection of errors and reconstruction of lost or damaged data up to a certain l
evel.
This will make sure that
all data will always be available, the data will not be lost and it will be stored at a another location for failover reasons
.

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Is the process of using an algorithm for verifying the integrity or authenticity of a
computer file. This can be
done by comparing two files bit
-
by
-
bit, but requires two copies of the same file, and may miss systematic corruptions
which might occur to both files. A more popular approach is to also store checksums (hashes) (message digests)
of files
for later comparison.

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The main objective of software assurance is to ensure that the processes, procedures, and products
used to produce and sustain the software conform to all requirements and standards specified to govern th
ose processes,
procedures, and products
. This can be also used to make sure that any web application
meets the requirements of what it
was designed to do and accessible to all that are authorized whether in the office or at a remote location.

A

Software Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What can help secure a system in a high risk environment where the system is prone to attack?

A

Sandboxing, isolating trusted processes, and proper handling of errors and exceptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a common web server attack in which unsolicited TCP requests that overwhelm the web servers’ resources and make it unavailable?

A

DOS or DDOS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What SQL query command can allow an attacker to access tables within that particular database without requiring elevated and/or administrator permissions and jeopardizing the structure and relevance of the data that the database contains.

A

SELECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

One method of disallowing a SQL injection attack when handling user fields in a web from that reads or write to a
database is to_______?

A

scrub all input of malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What are the two steps of the threat model that data flow

approaches.

A

Characterize the system and view the

system as an adversary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The two attacks that can affect both the operating system and databases are______and______?

A

accessing ports that are not secured and/or
locked down

the exploitation of default pa
sswords that are not changed when the OS and the database were first
installed.

48
Q

Monitoring and Delivery and support are the control domains to the ___________phase of the SDLC.

A

sustainment

49
Q

Acquisition and Implementation is the control domain to the _______ and _____ phase of the SDLC.

A

analysis, design

50
Q

Coding takes place in the ________ phase of the SDLC.

A

construction

51
Q

In Task Refinement, specific security activities must be identified when integrating security
requirements into a work breakdown structure for the new software
development effort.

A

Task Refinement

52
Q

The Release Manager will conduct the code review process as one of the parts or process of the
software development.
The release manager can also be assigned the task of the deployment of the finished product to the
v
arious environments at project completion.

A

Release Manager

53
Q

Has the SDLC role to
identify the requirements of an application (example: Web Application). That
business analyst must also be able to identify who will be impacted by such application. Once t
he application is developed
in a test environment, the business analyst must insure that the user acceptance testing is completed and to standards.

A

Business Analyst

54
Q

Has the responsibility to prepare a document plan that will verify that a systems code
performs the proper
actions that it was designed to do.

A

Tester Role

55
Q

SQL injection
is a code injection technique, used to attack data
-
driven applications, in which nefarious
SQL statements are inserted into an entry field for
execution. This can be done from any form or place that allows the
attacker to enter any type of information which is somewhat connected to a database.

A

SQL Injection

56
Q

The focus of beta version
is reducing impacts to users, often incorporating usability te
sting and expectation
of functionality. Beta version software is often useful for demonstrations and previews within an organization and to
prospective customers.

A

Beta version

57
Q

a classification scheme for characterizing
/measuring
known thr
eats
/vulnerabilities
according to the kinds of
exploit that are used (or motivation of the attacker).
It a
lso focuses on the end results of possible attacks rather than on the
identification of each specific attack.

A

STRIDE

58
Q

“Identity spoofing” is a key risk for applications that have many users but provide a single
execution context at the application and database level. In particular, users should not be able to become any other user or
assume the attributes of another user
.

A

STRIDE:

(S) Spoofing Identity

59
Q

Users can potentially change data delivered to them, return it, and thereby potentially
manipulate client
-
side validation, GET and POST results, cookies, HTTP headers, and so forth. The application should
not send data to the use
r, such as interest rates or periods, which are obtainable only from within the application itself. The
application should also carefully check data received from the user and validate that it is sane and applicable before
storing or using it.

A

STRIDE:

(T) Tampering with Data

60
Q

Users may dispute transactions if there is insufficient auditing or recordkeeping of their activity. For
example, if a user says, “But I didn’t transfer any money to this external account!”, and you cannot track his/her activities
through the applicat
ion, then it is extremely likely that the transaction will have to be written off as a loss.
Therefore, consider if the application requires non
-
repudiation controls, such as web access logs, audit trails at each tier,
or the same user context from top to
bottom. Preferably, the application should run with the user’s privileges, not more,
but this may not be possible with many off
-
the
-
shelf application frameworks.

A

STRIDE:

(R) Repudiation

61
Q

Users are rightfully wary of submitting private details to a syst
em. If it is possible for an
attacker to publicly reveal user data at large, whether anonymously or as an authorized user, there will be an immediate
loss of confidence and a substantial period of reputation loss. Therefore, applications must include stron
g controls to
prevent user ID tampering and abuse, particularly if they use a single context to run the entire application.
Also, consider if the user’s web browser may leak information. Some web browsers may ignore the no caching directives
in HTTP heade
rs or handle them incorrectly. In a corresponding fashion, every secure application has a responsibility to
minimize the amount of information stored by the web browser, just in case it leaks or leaves information behind, which
can be used by an attacker t
o learn details about the application, the user, or to potentially become that user.
Finally, in implementing persistent values, keep in mind that the use of hidden fields is insecure by nature. Such storage
should not be relied on to secure sensitive inf
ormation or to provide adequate personal privacy safeguards.

A

STRIDE:

(I) Information Disclosure

62
Q

Application designers should be aware that their applications may be subject to a denial of service
attack. Therefore, the use of expensive resources such as large files, c
omplex calculations, heavy
-
duty searches, or long
queries should be reserved for authenticated and authorized users, and not available to anonymous users.
For applications that do not have this luxury, every facet of the application should be engineered t
o perform as little work
as possible, to use fast and few database queries, to avoid exposing large files or unique links per user, in order to preven
t
simple denial of service attacks.

A

STRIDE:

(D) Denial of Service

63
Q

If an application provides distinct user a
nd administrative roles, then it is vital to ensure that
the user cannot elevate his/her role to a higher privilege one. In particular, simply not displaying privileged role links is
insufficient. Instead, all actions should be gated through an authorizati
on matrix, to ensure that only the permitted roles
can access privileged functionality.

A

STRIDE:

(E) Elevation of Privilege

64
Q

assessing computer security threats previously used at Microsoft and currently used
by OpenStack an
d many other corporations. It provides a mnemonic for risk rating security threats using five categories.

Analyzes threats as part of the breakdown
structure.

A

DREAD (Risk Assessment Model):

When a given threat is assessed using DREAD, each category is given a rating
on probability and damage potential
. For
example,
3 for high, 2 for medium, 1 for low and 0 for none. (Rating scales running from 0 to 10 are common) The sum of
all ratings for a given exploit can be used to prioritize among different exploits.

65
Q

how bad would an attack be?

Ranks the extent of harm that occurs if a vulnerability is exploited.

A

DREAD (Risk Assessment Model):

Damage

66
Q

how
easy is it to reproduce the attack?
Ranks how often an attempt at exploiting a vulnerability
really works.

A

DREAD (Risk Assessment Model):

Reproducibility

67
Q

how much work is it to launch the attack?
Measures the effort required to launch the
attack.

A

DREAD (Risk Assessment Model):

Exploitability/Vulnerability

68
Q

how man
y people will be impacted?
Measures the number of installed instances of the system
affected by an exploit.

A

DREAD (Risk Assessment Model):

Affected users

69
Q
how easy is it to discover the threat?
States the likelihood
that a vulnerability will
be found by 
security researchers or hackers
.
A

DREAD (Risk Assessment Model):

Discoverability

70
Q

A threat model is a diagram and description t
hat tells a story of how an attacker could exploit the
vulnerability. This is not a step by step process, but a narrative approach to the attack that should help guide the mitigati
on
techniques that need to be put in place to protect the system at that poi
nt.
It can also define the security of an application
and reduces the number of vulnerabilities.
It also has the 2 steps of identifying and prioritizing vulnerabilities.

A

Threat Model

71
Q

Is a detailed breakdown of the communication that will occur between actors and system objects or
components. A sequence diagram bridges the gap between the business analysis and the development analysis; this type
of diagram can be considered a business
description or a development description of system functionality.

A

Sequence Diagram

72
Q
T
-
MAP defines a set of threat
-
relevant 
attributes for each
layers or nodes. These attributes can be classified as 
either probability
-
relevant, size
-
of
-
loss relevant, or descriptive. 
These class attributes are primarily derived from
Common 
Vulnerability Scoring System (CVSS).
A

Map

73
Q

SDLC Management Control Domains:
Project Definition, User Requirements Definition
and Systems Requirement Definition.

A

Planning / Organization

74
Q

SDLC Management Control Domains:
User Requirements Definition, System Requirement Definition, Analysis and Design and
System Build / Prototype / Pilot

A

Acquisition / Implementation

75
Q

SDLC Management Control Domains:
Analysis and Design, System Build / Prototype / Pilot, Implementation and Training and
Sustainment.

A

Delivery and Support

76
Q

SDLC Management Control Domains:
User Requirements Definition, Systems Requirements Definition
, Analysis and Design, System Build /
Prototype / Pilot, Implementation and Training and Sustainment.

A

Monitoring

77
Q

Is a phase of the SDLC that defines security functions that an application should satisfy. The
designated employee can also speak with several stakeholders to determine the expected end state of the application.

A

Requirements Analysis

78
Q

Security should be involved
in all phases of the SDLC, but exploitation of vulnerabilities to identify
weaknesses should be done in the testing phase

A

Testing Phase

79
Q

An
Incident response
plan
is an organized approach to addressing and managing the aftermat
h
of a security b
reach or compromise on a system or software
. The goal is to handle the situation in a way that limits
damage and reduces recovery time and costs.
The incident response plan will take place at the operation phase of the
SDLC.

A

Incident Response Plan

80
Q

Earned Value Management:

BCWS

A

Budget Cost Work Scheduled

81
Q

Earned Value Management:

BCWP

A

Budget Cost of Work Performed

82
Q

Earned Value Management:

SV

A

Scheduled Variance

83
Q

Earned Value Management:

CV

A

Cost Variance

84
Q

Earned Value Management:

SV=

A

BCWP - BCWS

85
Q

Earned Value Management:

CV=

A

BCWP - ACWP

86
Q

Steps in the Work Breakdown Structure (WBS):

Examine the set of required external deliverables.

A

1

87
Q

Steps in the Work Breakdown Structure (WBS):
Identify
and list the steps and tasks needed to produce the required deliverables, inc
luding any tasks for additional
intermediate deliverables needed to complete the final deliverable.

A

2

88
Q

Steps in the Work Breakdown Structure (WBS):

Sequence the identified tasks required to produce the deliverable.

A

3

89
Q

Steps in the Work Breakdown Structure (WBS):
Est
imate the effort required to perform each task.

A

4

90
Q

Steps in the Work Breakdown Structure (WBS):

Estimate the productivity of the resources that will be applied to the tasks.

A

5

91
Q

Steps in the Work Breakdown Structure (WBS):

Compute the time needed for each task by dividing the task effort estimates by the resource productivity estimates.

A

6

92
Q

Steps in the Work Breakdown Structure (WBS):
Lay out the time needed for each task and “label” each task with its task name and the assigned resources; this layout of
sequences of tasks with their associated time and resources essentially forms the initial schedule.

A

7

93
Q

Capability Maturity Model Integration (CMMI) levels:
Organizational innovations and deployment
Casual analysis and resolution
Overall testing to achieve efficiencies

A

ML5

94
Q

Capability Maturity Model Integration (CMMI) levels:
Organizational process performance
Quantitative project management

A

ML4

95
Q
Capability Maturity Model Integration (CMMI) levels:
Requirements development
Technical solution
Product integration
Verification
Validation
Organizational process focus
Organizational process definition
Organizational training
Integrated project management
Risk Management
Integrated teaming
Integrated supplier management
Decision analysis and resolution
Organizational environment for integration
A

ML3

96
Q
Capability Maturity Model Integration (CMMI) levels:
Requirements management 
Project planning
Project monitoring and control
Supplier agreement management 
Measurement and analysis 
Process and product quality assurance
Configuration management
A

ML2

97
Q

Capability Maturity Model Integration (CMMI) levels:

NONE

A

ML1

98
Q

The Processes areas of CMMI

1) Organizational process focus
2) Organizational process definition
3) Organizational Training
4) Organizational process performance
5) Organizational innovation and deployment

A

Process Management

99
Q

The Processes areas of CMMI

1) Project Planning
2) Project Monitoring and control
3) Supplier agreement management
4) Integrated project management
5) Risk Management
6) Integrated teaming
7) Integrated supplier management
8) Quantitative project management

A

Project Management

100
Q

The Processes areas of CMMI

1) Requirements development
2) Requirements Management
3) Technical Solution
4) Product Integration
5) Verification
6) Validation

A

Engineering

101
Q
The Processes areas of CMMI
1) Configuration Management
2) Process and product quality assurance
3) Measurement and Analysis
4) Organizational envi
ronment for integration
5) Decision analysis and resolution
6) Casual analysis and resolution
A

Support

102
Q

A software development methodology based on UML. It organizes the development of software into four phases, each consisting of one or more executable iterations of the software at that stage of development. It’s also an interactive and incremental model that utilizes the divide and conquer methodology to decompose a complex problem into smaller parts. It’s also heavy with formal, established framework.

A

Rational Unified Process (RUP)

103
Q

Based on four core values of communication, simplicity, feedback, and courage. It also
includes fundamental principles of incremen
tal change, embracing change and quality of work.

A

Extreme Programming (XP)

104
Q

A disciplined method that can be combined with other techniques.

A

Scrum

105
Q

Might be a designated building with servers, computers, and the needed office space, but with no active
connections or running servers.

A

Warm Site

106
Q

Was
the formal United States national standard cryptosystem for securing
informati
on; it’s an example of a Feistel cipher using a 56
-
birt key. It’s now considered breakable, but it survives in the
form of 3
-
DES, which is
the use of encryption using three separate keys.

A

Data Encryption Standard (DES)

107
Q

Use of establi
shed quality
assurance practices and fault tolerance techniques; Ability
of software to operate dependably, despite the presence of sponsored faults and security as a part of the software specified
in the beginning of the software development process.

A

Secure Software Assurance (SSA)

108
Q

Source code fault injection, direct code analysis and property based testing.

A

White Box Testing

109
Q

Fuzz testing, byte code, assembler code and binary code scanning.

A

Black Box Testing

110
Q

This occurs when your software prints too much information in
response to queries or when it
prints to public error logs. Internal data can often be the target of the attacker, so what you share via output in
development or in production needs to be considered as a possible source of compromise.

A

Unintentional disclosure

111
Q

In cryptography and computer security, a ________ attack is where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

A

man-in-the-middle attack

often abbreviated MitM, MiM attack, MitMA, or the same using all capital letters

112
Q

Attack surface in relation to threat:

Sniffing

A

Network

113
Q

Attack surface in relation to threat:

Rootkit

A

Operating system

114
Q

Attack surface in relation to threat:

Buffer Overflow

A

Programming Languages

115
Q

Attack surface in relation to threat:

SQL Injection

A

Database Application

116
Q

Refers to all activities designed to measure and improve
quality in a product , including the whole
process, training, preparation of the team, and activities associated with customer feedback.

A

Quality Assurance