2026-COMPLETE QUESTIONS AND ACCURATE
ANSWERS | ALREADY PASSED!!
A company is creating a new software to track customer balance
and wants to design a secure application.
Which best practice should be applied?
A Develop a secure authentication method that has a closed design
B Allow mediation bypass or suspension for software testing and
emergency planning
C Ensure there is physical acceptability to ensure software is intuitive
for the users to do their jobs
D Create multiple layers of protection so that a subsequent layer
provides protection if a layer is breached
D
,A company is developing a secure software that has to be
evaluated and tested by a large number of experts.
Which security principle should be applied?
A Fail safe
B Open design
C Defense in depth
D Complete mediation
B
Which type of TCP scanning indicates that a system is moving to the
second phase in a three-way TCP handshake?
A TCP SYN scanning
B TCP ACK scanning
C TCP XMAS scanning
D TCP Connect scanning
A
, Which evaluation technique provides invalid, unexpected, or
random data to the inputs of a computer software program?
A Fuzz testing
B Static analysis
C Dynamic analysis
D Regression testing
A
Which approach provides an opportunity to improve the software
development life cycle by tailoring the process to the specific risks
facing the organization?
A Agile methodology
B Waterfall methodology
C Building security in maturity model (BSIMM)
D Software assurance maturity model (SAMM)
D
, Which phase contains sophisticated software development
processes that ensure that feedback from one phase reaches to the
previous phase to
improve future results?
A Initial
B Managed
C Optimizing
D Repeatable
C
Which countermeasure is used to mitigate SQL injection attacks?
A SQL Firewall
B Projected bijection
C Query parameterization
D Progressive ColdFusion
C