Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

D487 – Secure Software Design – Western Governors University – Knowledge Check and Quiz with Answers

Beoordeling
-
Verkocht
-
Pagina's
6
Cijfer
A
Geüpload op
23-01-2025
Geschreven in
2024/2025

This document includes both the Knowledge Check and Quiz materials for D487: Secure Software Design at Western Governors University. It covers critical topics such as secure coding principles, software vulnerabilities, secure design patterns, and mitigation strategies. Each question is paired with a correct answer to support effective self-assessment and exam preparation.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

D487 - Secure Software Design
Knowlege Check and Quiz
What are the two common best principles of software applications in the development
process? - *answers *Quality Code & Secure Code

What ensures that the user has the appropriate role and privilege to view data? -
*answers *Authorization

Which security goal is defined by "guarding against improper information modification or
destruction and ensuring information non-repudiation and authenticity"? - *answers
*Integrity

Which phase in an SDLC helps to define the problem and scope of any existing
systems and determine the objectives of new systems? - *answers *Planning

What happens during a dynamic code review? - *answers *Programmers monitor
system memory, functional behavior, response times, and overall performance.

How should you store your application user credentials in your application database? -
*answers *Store credentials using salted hashes

Which software methodology resembles an assembly-line approach? - *answers
*Waterfall model

Which software methodology approach provides faster time to market and higher
business value? - *answers *Agile model

In Scrum methodology, who is responsible for making decisions on the requirements? -
*answers *Product Owner

What is the product risk profile? - *answers *A security assessment deliverable that
estimates the actual cost of the product

A software security team member has been tasked with creating a deliverable that
provides details on where and to what degree sensitive customer information is
collected, stored, or created within a new product offering.

What does the team member need to deliver in order to meet the objective? - *answers
*Privacy impact assessment

A software security team member has been tasked with creating a threat model for the
login process of a new product.What is the first step the team member should take? -
*answers *Identify security objectives

What are three parts of the STRIDE methodology? - *answers *Spoofing, Elevation,
Tampering

, D487 - Secure Software Design
Knowlege Check and Quiz
What is the reason software security teams host discovery meetings with stakeholders
early in the development life cycle? - *answers *To ensure that security is built into the
product from the start

Why should a security team provide documented certification requirements during the
software assessment phase? - *answers *Depending on the environment in which the
product resides, certifications may be required by corporate or government entities
before the software can be released to customers.

What are two items that should be included in the privacy impact assessment plan
regardless of which methodology is used? - *answers *Required process steps &
Technologies and techniques

What are the goals of each SDL deliverable? - Product Risk Profile - *answers
*Estimate the actual cost of the product

What are the goals of each SDL deliverable? -SDL project outline - *answers *Map
security activities to the development schedule

What are the goals of each SDL deliverable? - Threat profile - *answers *Guide security
activities to protect the product from vulnerabilities

What are the goals of each SDL deliverable? -List of third-party software - *answers
*Identify the dependence on unmanaged software

What is a threat action that is designed to illegally access and use another person's
credentials? - *answers *Spoofing

What are two steps of the threat modeling process? - *answers *Survey The application
& Decompose the application

What do the "A" and the first "D" in the DREAD acronym represent? - *answers
*Damage & Affected Users

Which shape indicates each type of flow diagram element? - External elements -
*answers *Rectangle

Which shape indicates each type of flow diagram element? - Data Store - *answers
*Two Parallel horizontal lines

Which shape indicates each type of flow diagram element? - Data Flow - *answers
*Solid Line with an arrow

Geschreven voor

Vak

Documentinformatie

Geüpload op
23 januari 2025
Aantal pagina's
6
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
lizishiru

Maak kennis met de verkoper

Seller avatar
lizishiru University of Nairobi
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
1 jaar
Aantal volgers
0
Documenten
355
Laatst verkocht
-
High-Quality Summaries and Exam Prep

Welcome to my Stuvia profile! I provide high-quality, well-structured academic materials that are designed to support serious learners in achieving their academic goals. My resources include detailed notes, comprehensive summaries, exam preparations, and study guides that are clear, accurate, and aligned with course objectives. Each document is carefully written to ensure clarity, depth, and reliability—making it easier for you to grasp complex concepts, revise efficiently, and excel in your assessments. By choosing my materials, you can expect: ✅ Accurate and well-researched content ✅ Organized and easy-to-follow structure ✅ Reliable support for exams, assignments, and study sessions My goal is to help students save time, study effectively, and achieve outstanding results.

Lees meer Lees minder
0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen