With Correct Detailed Answers 2025
SDL Goals - ANSWER- Reduce the number of vulnerability and Privacy issues
Reduce the severity of the remaining vulnerabilities
Three main goals of secure software development - ANSWER- Quality
Security
Maintainability
What are the three threat intention categories? - ANSWER- unintentional
Intentional but non-malicious
malicious
What are the primary issues in modeling - ANSWER- Doing it well
Doing it thoroughly enough
Doing Knowing what to do with the results
12 categories of BSIMM - ANSWER- Strategy and Metrics
Compliance and Policy
Training
Attack Models
Security Features and Design
Standards and Requirements
Architecture Analysis
Code Review
Security Testing
Penetration Testing
Software Environment
Configuration and Vulnerability Management
ISO 27001 - ANSWER- Specifies a management system intended to bring information
security under formal management control.
ISO 27034 - ANSWER- Guidance to help organizations embed security within their
processes that help secure applications running in the environment.
, SAFECode - ANSWER- Global industry led effort to identify and promote best practices
for software, hardware and services.
DHS Software Assurance Program - ANSWER- Created the Build Security In website
(BSI) to push security in the SDLC
NVD - ANSWER- National Vulnerability Database
SAMATE - ANSWER- Dedicated to improving software assurance by developing
methods to enable software tool evaluations, measuring the effectiveness of tools and
techniques, and identifying gaps in tools and methods.
What is an exposure? - ANSWER- A mistake in software that allows access to
information or capabilities that can be used by a hacker as a stepping-stone into a
system or network.
Fuzzing - ANSWER- a technique of penetration testing that can include providing
unexpected values as input to an application to make it crash
Static Analysis - ANSWER- The analysis of computer software that is performed without
actually executing programs
Dynamic Analysis - ANSWER- Analysis of the code while it is executed.
Software Security Champions - ANSWER- Software engineers/designers who are
capable of thinking like an attacker, stepping stone to an architect role.
When might Waterfall Development be used? - ANSWER- When requirements are fully
understood and not complex.
What kinds of teams are used in Agile development - ANSWER- Cross functional teams
that are responsible all functions in each iteration
What is the goal of Scrum? - ANSWER- Maximize the ability to deliver quickly and
respond to emerging needs.
Lean development - ANSWER- You select, plan, develop, test, and deploy one feature
before moving on the the next.
What is the discovery meeting? - ANSWER- SDL kickoff meeting
Functional Requirements - ANSWER- What an application must do to serve a business
need.
Nonfunctional Requirments - ANSWER- How well the functional requirements are met.