Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

Secure-Software-Design Questions and Answers

Question # 6

A new product does not display personally identifiable information, will not let private documents be printed, and requires elevation of privilege to retrieve archive documents. Which secure coding practice is this describing?

A.

Access control

B.

Data protection

C.

Input validation

D.

Authentication

Full Access
Question # 7

A potential threat was discovered during vulnerability testing when an environment configuration file was found that contained the database username and password stored in plain text.

How should existing security controls be adjusted to prevent this in the future?

A.

Enforce Role-Based Authorization

B.

Encrypt Secrets in Storage and Transit

C.

Ensure Strong Password Policies are in Effect

D.

Validate All User Input

Full Access
Question # 8

While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure no sensitive information is stored in plain text in cookies

B.

Ensure user sessions timeout after short intervals

C.

Ensure role-based access control is enforced for access to all resources

D.

Ensure strong password policies are enforced

Full Access
Question # 9

The product security incident response team (PSIRT) has decided to make a formal public disclosure, including base and temporal common vulnerability scoring system (CVSS) scores and a common vulnerabilities and exposures (CVE) ID report, of an externally discovered vulnerability.

What is the most likely reason for making a public disclosure?

A.

The potential for increased public awareness of a vulnerability is probable, which could lead to higher risk for customers.

B.

The vulnerability reporter has threatened to make the finding public after being notified that their case was not credible.

C.

The response team has determined that the vulnerability is credible.

D.

Notification of a vulnerability from an external party has occurred.

Full Access
Question # 10

Which type of security analysis is performed by injecting malformed data into open interfaces of an executable or running application and is most commonly executed during the testing or deployment phases of the SDLC?

A.

Static Analysis

B.

Fuzz Testing

C.

Dynamic Analysis

D.

Manual Code Review

Full Access
Question # 11

Which software-testing technique can be automated or semi-automated and provides invalid, unexpected, or random data to the inputs of a computer software program?

A.

Fuzzing

B.

Static analysis

C.

Dynamic analysis

D.

Bugtraq

Full Access
Question # 12

The final security review determined that two low-risk security issues identified in testing are still outstanding. Developers have assured the security team that both issues can be resolved quickly once they have time to fix them. The security team is confident that developers can fix the flaws in the first post-release patch.

What is the result of the final security review?

A.

Not Passed but Does Not Require Escalation

B.

Not Passed and Requires Escalation

C.

Passed with Exceptions

D.

Passed

Full Access
Question # 13

Which secure coding best practice says to assume all incoming data should be considered untrusted and should be validated to ensure the system only accepts valid data?

A.

General coding practices

B.

Input validation

C.

Session management

D.

System configuration

Full Access
Question # 14

After being notified of a vulnerability in the company’s online payment system, the Product Security Incident Response Team (PSIRT) was unable to recreate the vulnerability in a testing lab.

What is the response team’s next step?

A.

Determine the Severity of the Vulnerability

B.

Notify the Reporter That the Case Is Going to Be Closed

C.

Determine How the Reporter Was Able to Create the Vulnerability

D.

Identify Resources and Schedule the Fix

Full Access
Question # 15

The software security team prepared a detailed schedule napping security development lifecycle phases to the type of analysis they will execute.

Which design and development deliverable aid the team prepare?

A.

Design security review

B.

Updated threat modeling artifacts

C.

Privacy implementation assessment results

D.

Security test plans

Full Access
Question # 16

During fuzz testing of the new product, an exception was thrown on the order entry view, which caused a full stack dump to be displayed in the browser window that included function names from the source code.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure privileges are restored after application exceptions

B.

Ensure all exceptions are handled in a standardized way

C.

Ensure private information is not logged

D.

Ensure sensitive information is scrubbed from all error messages

Full Access
Question # 17

Which software control test examines an application from a user perspective by providing a wide variety of input scenarios and inspecting the output?

A.

Dynamic

B.

Black box

C.

Static

D.

White box

Full Access
Question # 18

Which secure software design principle states that it is always safer to require agreement of more than one entity to make a decision?

A.

Least Privilege

B.

Total Mediation

C.

Separation of Privileges

D.

Psychological Acceptability

Full Access
Question # 19

Which security assessment deliverable identifies possible security vulnerabilities in the product?

A.

Threat profile

B.

Metrics template

C.

SDL project outline

D.

List of third-party software

Full Access
Question # 20

Which software control test examines the internal logical structures of a program and steps through the code line by line to analyze the program for potential errors?

A.

White box testing

B.

Reasonableness testing

C.

Black box testing

D.

Dynamic testing

Full Access
Question # 21

Which question reflects the security change management component of the change management process?

A.

How critical is the software to meeting the customers' mission?

B.

What threats are possible in the environment where the software will be operating?

C.

Which security objectives are required by the software?

D.

How is remote administration secured?

Full Access
Question # 22

What is a countermeasure to the web application security frame (ASF) authentication threat category?

A.

Role-based access controls restrict access

B.

Credentials and tokens are encrypted.

C.

Cookies have expiration timestamps.

D.

Sensitive information is scrubbed from error messages

Full Access
Question # 23

Which security assessment deliverable defines measures that can be periodically reported to management?

A.

Metrics Template

B.

SDL Project Outline

C.

Threat Profile

D.

Product Risk Profile

Full Access
Question # 24

Which category classifies identified threats that have defenses in place and do not expose the application to exploits?

A.

Threat Profile

B.

Fully Mitigated Threat

C.

Partially Mitigated Threat

D.

Unmitigated Threats

Full Access
Question # 25

A potential threat was discovered during automated system testing when a PATCH request sent to the API caused an unhandled server exception. The API only supports GET. POST. PUT, and DELETE requests.

How should existing security controls be adjusted to prevent this in the future?

A.

Property configure acceptable API requests

B.

Enforce role-based authorization

C.

Use API keys to enforce authorization of every request

D.

Ensure audit logs are in place for sensitive transactions

Full Access
Question # 26

What is a best practice of secure coding?

A.

Planning

B.

Session management

C.

User acceptance testing

D.

Microservices

Full Access
Question # 27

Which mitigation technique can be used to fight against a denial of service threat?

A.

Digital signatures

B.

Protect secrets

C.

Timestamps

D.

Throttling

Full Access
Question # 28

Which software development model starts by specifying and implementing just a part of the software, which is then reviewed and identifies further requirements that are implemented by repeating the cycle?

A.

Iterative

B.

Implementation

C.

Waterfall

D.

Code and fix

Full Access
Question # 29

Which mitigation technique can be used to light against a threat where a user may gain access to administrator level functionality?

A.

Encryption

B.

Quality of service

C.

Hashes

D.

Run with least privilege

Full Access
Question # 30

Which privacy impact statement requirement type defines how personal information will be protected when authorized or independent external entities are involved?

A.

Personal information retention requirements

B.

User controls requirements

C.

Third party requirements

D.

Data integrity requirements

Full Access
Question # 31

A public library needs to implement security control on publicly used computers to prevent illegal downloads.

Which security control would prevent this threat?

A.

Nonrepudiation

B.

Authentication

C.

Integrity

D.

Availability

Full Access
Question # 32

The security team is reviewing whether changes or open issues exist that would affect requirements for handling personal information documented in earlier phases of the development life cycle.

Which activity of the Ship SDL phase is being performed?

A.

Vulnerability scan

B.

Final security review

C.

Open-source licensing review

D.

Final privacy review

Full Access
Question # 33

A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers are actively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.

Which phase of the software development lifecycle (SDLC) is being described?

A.

Deployment

B.

Design

C.

Implementation

D.

Requirements

Full Access
Question # 34

A recent vulnerability scan uncovered an XML external entity (XXE) Haw that could allow attackers to return the contents of a system file by including a specific payload in an XML request.

How should the organization remediate this vulnerability?

A.

Ensure audit trails exist for all sensitive transactions

B.

Disable resolution of external entities in the parsing library

C.

Enforce role-based authorization in all application layers

D.

Ensure authentication cookies are encrypted

Full Access
Question # 35

Which secure coding best practice says to use well-vetted algorithms to ensure that the application uses random identifiers, that identifiers are appropriately restricted to the application, and that user processes are fully terminated on logout?

A.

Output Encoding

B.

Input Validation

C.

Access Control

D.

Session Management

Full Access