Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Features have been developed and fully tested, the production environment has been created, and leadership has approved the release of the new product. Technicians have scheduled a time and date to make the product available to customers.

Which phase of the software development lifecycle (SDLC) is being described?

A.

Maintenance

B.

Deployment

C.

End of life

D.

Testing

Full Access
Question # 5

A potential threat was discovered during vulnerability testing when an environment configuration file was found that contained the database username and password stored in plain text.

How should existing security controls be adjusted to prevent this in the future?

A.

Enforce Role-Based Authorization

B.

Encrypt Secrets in Storage and Transit

C.

Ensure Strong Password Policies are in Effect

D.

Validate All User Input

Full Access
Question # 6

Credit card numbers are encrypted when stored in the database but are automatically decrypted when data is fetched. The testing tool intercepted the GET response, and testers were able to view credit card numbers as clear text.

How should the organization remediate this vulnerability?

A.

Never cache sensitive data

B.

Ensure there is an audit trail for all sensitive transactions

C.

Ensure all data in transit is encrypted

D.

Enforce role-based authorization controls in all application layers

Full Access
Question # 7

The security team contracts with an independent security consulting firm to simulate attacks on deployed products and report results to organizational leadership.

Which category of secure software best practices is the team performing?

A.

Attack models

B.

Code review

C.

Architecture analysis

D.

Penetration testing

Full Access
Question # 8

Which secure coding best practice ensures sensitive information is not disclosed in any responses to users, authorized or unauthorized?

A.

Input validation

B.

System configuration

C.

Authentication and password management

D.

Error handling and logging

Full Access
Question # 9

Which question reflects the security change management component of the change management process?

A.

How critical is the software to meeting the customers' mission?

B.

What threats are possible in the environment where the software will be operating?

C.

Which security objectives are required by the software?

D.

How is remote administration secured?

Full Access
Question # 10

The software security team prepared a detailed schedule napping security development lifecycle phases to the type of analysis they will execute.

Which design and development deliverable aid the team prepare?

A.

Design security review

B.

Updated threat modeling artifacts

C.

Privacy implementation assessment results

D.

Security test plans

Full Access
Question # 11

Which SDL security goal is defined as ensuring timely and reliable access to and use of information?

A.

Information security

B.

Confidentiality

C.

Availability

D.

Integrity

Full Access
Question # 12

The security team is reviewing whether changes or open issues exist that would affect requirements for handling personal information documented in earlier phases of the development life cycle.

Which activity of the Ship SDL phase is being performed?

A.

Vulnerability scan

B.

Final security review

C.

Open-source licensing review

D.

Final privacy review

Full Access
Question # 13

Which secure coding best practice ensures sensitive information is not disclosed in any responses to users, authorized or unauthorized?

A.

Authentication and Password Management

B.

Input Validation

C.

System Configuration

D.

Error Handling and Logging

Full Access
Question # 14

Which secure coding best practice says to ensure that buffers are allocated correctly and at the right size, that input strings are truncated to a reasonable length, and that resources, connections, objects, and file handles are destroyed once the application no longer needs them?

A.

Input Validation

B.

Memory Management

C.

Session Management

D.

Data Protection

Full Access
Question # 15

Automated security testing was performed by attempting to log in to the new product with a known username using a collection of passwords. Access was granted after a few hundred attempts.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure passwords are encrypted when stored in persistent data stores

B.

Ensure authentication controls are resistant to brute force attacks

C.

Ensure strong password policies are enforced

D.

Ensure credentials and authentication tokens are encrypted during transit

Full Access
Question # 16

What are the three primary goals of the secure software development process?

A.

Performance, reliability, and maintainability

B.

Cost, speed to market, and profitability

C.

Redundancy, scalability, and portability

D.

Confidentiality, integrity, and availability

Full Access
Question # 17

The security team is identifying technical resources that will be needed to perform the final product security review.

Which step of the final product security review process are they in?

A.

Release and Ship

B.

Identify Feature Eligibility

C.

Evaluate and Plan for Remediation

D.

Assess Resource Availability

Full Access
Question # 18

The security team is reviewing all noncommercial software libraries used in the new product to ensure they are being used according to the legal specifications defined by the authors.

What activity of the Ship SDL phase is being performed?

A.

Policy compliance analysis

B.

Open-source licensing review

C.

Penetration testing

D.

Final security review

Full Access
Question # 19

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's claims intake component. The base score of the vulnerability was 3.5 and changed to 5.9 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

A.

Critical severity

B.

High severity

C.

Low severity

D.

Medium severity

Full Access
Question # 20

Which category classifies identified threats that have some defenses in place and expose the application to limited exploits?

A.

Fully Mitigated Threat

B.

Unmitigated Threats

C.

Threat Profile

D.

Partially Mitigated Threat

Full Access
Question # 21

Which security assessment deliverable defines measures that can be periodically reported to management?

A.

Metrics Template

B.

SDL Project Outline

C.

Threat Profile

D.

Product Risk Profile

Full Access
Question # 22

The software security team has been tasked with assessing a document management application that has been in use for many years and developing a plan to ensure it complies with organizational policies.

Which post-release deliverable is being described?

A.

Security strategy tor M&A products

B.

Security strategy for legacy code

C.

Post-release certifications

D.

External vulnerability disclosure response process

Full Access
Question # 23

What is one of the tour core values of the agile manifesto?

A.

Communication between team members

B.

Individuals and interactions over processes and tools

C.

Business people and developers must work together daily throughout the project.

D.

Teams should have a dedicated and open workspace.

Full Access
Question # 24

The organization has contracted with an outside firm to simulate an attack on the new software product and report findings and remediation recommendations.

Which activity of the Ship SDL phase is being performed?

A.

Penetration testing

B.

Policy compliance analysis

C.

Open-source licensing review

D.

Final security review

Full Access
Question # 25

The software security team prepared a report of necessary coding and architecture changes identified during the security assessment.

Which design and development deliverable did the team prepare?

A.

Updated threat modeling artifacts

B.

Security test plans

C.

Privacy implementation assessment results

D.

Design security review

Full Access
Question # 26

Company leadership has discovered an untapped revenue stream within its customer base and wants to meet with IT to share its vision for the future and determine whether to move forward.

Which phase of the software development lifecycle (SDLC) is being described?

A.

Implementation

B.

Design

C.

Planning

D.

Requirements

Full Access
Question # 27

Company leadership has contracted with a security firm to evaluate the vulnerability of all externally lacing enterprise applications via automated and manual system interactions. Which security testing technique is being used?

A.

Properly-based-testing

B.

Source-code analysis

C.

Penetration testing

D.

Source-code fault injection

Full Access
Question # 28

Which security assessment deliverable identities unmanaged code that must be kept up to date throughout the life of the product?

A.

Threat profile

B.

Metrics template

C.

Product risk profile

D.

List of third-party software

Full Access
Question # 29

Which threat modeling methodology involves creating or using collections of similar threats?

A.

Data Flow Diagrams

B.

Attack Libraries

C.

Attack Trees

D.

Security Profile

Full Access
Question # 30

What sits between a browser and an internet connection and alters requests and responses in a way the developer did not intend?

A.

Load testing

B.

Input validation

C.

Intercept proxy

D.

Reverse engineering

Full Access
Question # 31

Which software control test examines the internal logical structures of a program and steps through the code line by line to analyze the program for potential errors?

A.

White box testing

B.

Reasonableness testing

C.

Black box testing

D.

Dynamic testing

Full Access
Question # 32

Which secure coding best practice says to only use tested and approved components and use task-specific, built-in APIs to conduct operating system functions?

A.

Session Management

B.

Authentication and Password Management

C.

Data Protection

D.

General Coding Practices

Full Access
Question # 33

Security testers have completed testing and are documenting the results of vulnerability scans and penetration analysis They are also creating documentation lo share with the organization's largest customers.

Which deliverable is being prepared?

A.

Open-source licensing review report

B.

Customer engagement framework

C.

Remediation report

D.

Security testing reports

Full Access