TEST BANK 2026 UPDATED QUESTIONS
AND VERIFIED ANSWERS GRADED A+
⩥ Regarding secure software development, __________ provide
developers with a foundation of consistent guidelines that can be
selectively chosen to fit the requirements and applicability of a project
instead of chosen based on individual preferences.
Select one:
a. Coding standards
b. Mission requirements
c. Access controls
d. Business expectations. Answer: a. Coding standards
⩥ From a secure software developer's perspective, a security model does
NOT help in which of the following tasks?
Select one:
a. Determining software functionality.
b. Designing a secure software architecture.
c. Verifying that the code will meet specifications.
,d. Finding errors and vulnerabilities in design.. Answer: b. Designing a
secure software architecture.
⩥ In the course of selecting an effective programming language,
languages that are ________ should not be used by software when
security is a necessity.
Select one:
a. At risk of buffer overflows
b. Compromised by SQl injection
c. Above the physical level
d. Below the application level. Answer: d. Below the application level
⩥ An important goal to meet when designing efficient, secure software
is to __________.
Select one:
a. Create the design understanding that the specifications will be
expanded until the project is deployed.
b. Allow for additional functions to remain in the software so they may
be used later.
c. Determine the amount of time it will take to complete the design.
d. Create the design with an understanding that the initial security
measures may fail due to new attacks or vulnerabilities.. Answer: d.
, Create the design with an understanding that the initial security
measures may fail due to new attacks or vulnerabilities.
⩥ Which of the following attributes of software must be confirmed to
meet the primary software security testing goal?
Select one:
a. Absence of exploitable weaknesses.
b. Predictably secure behavior.
c. Security-aware error and exception handling.
d. All of the above.. Answer: d. All of the above.
⩥ _________ is/are a combination of two dynamic testing techniques for
secure software that allows a tester to create a more robust testing
process where user inputs and external interfaces can be tested. Often,
these testers use debuggers to help them while attempting attacks.
Select one:
a. Gray box testing
b. Formal method testing
c. White box testing
d. Code reviews. Answer: a. Gray box testing
⩥ According to the principles of software security architecture,
developers should try to keep from relying on _______as a means of
security when modularizing a design.