Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure no sensitive information is stored in plain text in cookies

B.

Ensure user sessions timeout after short intervals

C.

Ensure role-based access control is enforced for access to all resources

D.

Ensure strong password policies are enforced

Full Access
Question # 5

A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers are actively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.

Which phase of the software development lifecycle (SDLC) is being described?

A.

Deployment

B.

Design

C.

Implementation

D.

Requirements

Full Access
Question # 6

The organization is moving from a waterfall to an agile software development methodology, so the software security group must adapt the security development life cycle as well. They have decided to break out security requirements and deliverables to fit better in the iterative life cycle by defining every-sprint requirements, one-time requirements, bucket requirements, and final security review requirements.

Which type of requirement slates that the team must identify primary security and privacy contacts?

A.

Final security review requirement

B.

Bucket requirement

C.

Every-sprint requirement

D.

One-time requirement

Full Access
Question # 7

During penetration testing, an analyst was able to create hundreds of user accounts by executing a script that sent individual requests to the registration endpoint.

How should the organization remediate this vulnerability?

A.

Use a Tool Like CAPTCHA to Prevent Batched Registrations and Bots

B.

Enforce Strong Password Complexity Standards

C.

Enforce Idle Time-Outs on Session IDs

D.

Ensure All Data Is Encrypted in Transit

Full Access
Question # 8

Automated security testing was performed by attempting to log in to the new product with a known username using a collection of passwords. Access was granted after a few hundred attempts.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure passwords are encrypted when stored in persistent data stores

B.

Ensure authentication controls are resistant to brute force attacks

C.

Ensure strong password policies are enforced

D.

Ensure credentials and authentication tokens are encrypted during transit

Full Access
Question # 9

Which secure coding best practice says to assume all incoming data should be considered untrusted and should be validated to ensure the system only accepts valid data?

A.

General coding practices

B.

Input validation

C.

Session management

D.

System configuration

Full Access
Question # 10

The scrum team decided that before any change can be merged and tested, it must be looked at by the learns lead developer, who will ensure accepted coding patterns are being followed and that the code meets the team's quality standards.

Which category of secure software best practices is the team performing?

A.

Architecture analysis

B.

Penetration testing

C.

Code review

D.

Training

Full Access
Question # 11

Senior IT staff has determined that a new product will be hosted in the cloud and will support web and mobile users. Developers will need to deliver secure REST services. Android and IOS mobile apps. and a web application. Developers are currently determining how to deliver each part of the overall product.

Which phase of the software development lifecycle (SDLC) is being described?

A.

Maintenance

B.

End of life

C.

Deployment

D.

Design

Full Access
Question # 12

Credit card numbers are encrypted when stored in the database but are automatically decrypted when data is fetched. The testing tool intercepted the GET response, and testers were able to view credit card numbers as clear text.

How should the organization remediate this vulnerability?

A.

Never cache sensitive data

B.

Ensure there is an audit trail for all sensitive transactions

C.

Ensure all data in transit is encrypted

D.

Enforce role-based authorization controls in all application layers

Full Access
Question # 13

The software security team is using an automation tool that generates random data to input into every field in the new product and track results.

Which security testing technique is being used?

A.

Black-Box Debugging

B.

Fuzz Testing

C.

Binary Code Analysis

D.

Byte Code Analysis

Full Access
Question # 14

A new product does not display personally identifiable information, will not let private documents be printed, and requires elevation of privilege to retrieve archive documents. Which secure coding practice is this describing?

A.

Access control

B.

Data protection

C.

Input validation

D.

Authentication

Full Access
Question # 15

Which secure coding best practice says to use well-vetted algorithms to ensure that the application uses random identifiers, that identifiers are appropriately restricted to the application, and that user processes are fully terminated on logout?

A.

Output Encoding

B.

Input Validation

C.

Access Control

D.

Session Management

Full Access
Question # 16

Which threat modeling step identifies the assets that need to be protected?

A.

Set the Scope

B.

Analyze the Target

C.

Rate Threats

D.

Identify and Document Threats

Full Access
Question # 17

During fuzz testing of the new product, an exception was thrown on the order entry view, which caused a full stack dump to be displayed in the browser window that included function names from the source code.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure privileges are restored after application exceptions

B.

Ensure all exceptions are handled in a standardized way

C.

Ensure private information is not logged

D.

Ensure sensitive information is scrubbed from all error messages

Full Access
Question # 18

Which DKEAD category has a risk rating based on the threat exploit's potential level of harm?

A.

Damage potential

B.

Reproducibility

C.

Affected users

D.

Exploitability

Full Access
Question # 19

Developers have finished coding, and changes have been peer-reviewed. Features have been deployed to a pre-production environment so that analysts may verify that the product is working as expected.

Which phase of the Software Development Life Cycle (SDLC) is being described?

A.

Requirements

B.

Design

C.

Testing

D.

Deployment

Full Access
Question # 20

In which step of the PASTA threat modeling methodology will the team capture infrastructure, application, and software dependencies?

A.

Attack modeling

B.

Define technical scope

C.

Define objectives

D.

Risk and impact analysis

Full Access
Question # 21

What is the privacy impact rating of an application that stores personally identifiable information, monitors users with ongoing transfers of anonymous data, and changes settings without notifying the user?

A.

P1 high privacy risk

B.

P2 moderate privacy risk

C.

P3 low privacy risk

D.

P4 no privacy risk

Full Access
Question # 22

Features have been developed and fully tested, the production environment has been created, and leadership has approved the release of the new product. Technicians have scheduled a time and date to make the product available to customers.

Which phase of the software development lifecycle (SDLC) is being described?

A.

Maintenance

B.

Deployment

C.

End of life

D.

Testing

Full Access
Question # 23

A recent security review has identified an aging credential recovery/forgotten password component that emails temporary passwords to users who claim to have forgotten their application password.

How should the organization remediate this vulnerability?

A.

Lock a User Account After Multiple Failed Authentication Attempts

B.

Ensure All Authorization Requests Are Logged

C.

Implement Multifactor Authentication

D.

Implement Role-Based Authorization

Full Access
Question # 24

The security software team has cloned the source code repository of the new software product so they can perform vulnerability testing by modifying or adding small snippets of code to see if they can cause unexpected behavior and application failure.

Which security testing technique is being used?

A.

Source-Code Fault Injection

B.

Dynamic Code Analysis

C.

Fuzz Testing

D.

Binary Fault Injection

Full Access
Question # 25

What is a best practice of secure coding?

A.

Planning

B.

Session management

C.

User acceptance testing

D.

Microservices

Full Access
Question # 26

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's claims intake component. The base score of the vulnerability was 3.5 and changed to 5.9 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

A.

Critical severity

B.

High severity

C.

Low severity

D.

Medium severity

Full Access
Question # 27

Which design and development deliverable contains the results of each type of evaluation that was performed and the type and number of vulnerabilities discovered?

A.

Security test execution report

B.

Security testing reports

C.

Privacy compliance report

D.

Remediation report

Full Access
Question # 28

A security architect is creating a data flow diagram and draws an arrow between two circles.

What does the arrow represent?

A.

Data Store

B.

External Entity

C.

Process

D.

Data Flow

Full Access
Question # 29

The product security incident response team (PSIRT) has decided to make a formal public disclosure, including base and temporal common vulnerability scoring system (CVSS) scores and a common vulnerabilities and exposures (CVE) ID report, of an externally discovered vulnerability.

What is the most likely reason for making a public disclosure?

A.

The potential for increased public awareness of a vulnerability is probable, which could lead to higher risk for customers.

B.

The vulnerability reporter has threatened to make the finding public after being notified that their case was not credible.

C.

The response team has determined that the vulnerability is credible.

D.

Notification of a vulnerability from an external party has occurred.

Full Access
Question # 30

Which secure software design principle states that it is always safer to require agreement of more than one entity to make a decision?

A.

Least Privilege

B.

Total Mediation

C.

Separation of Privileges

D.

Psychological Acceptability

Full Access
Question # 31

Which type of security analysis is performed by reviewing source code line-by-line after other security analysis techniques have been executed?

A.

Dynamic Analysis

B.

Static Analysis

C.

Manual Code Review

D.

Fuzz Testing

Full Access
Question # 32

The software security team prepared a report of necessary coding and architecture changes identified during the security assessment.

Which design and development deliverable did the team prepare?

A.

Updated threat modeling artifacts

B.

Security test plans

C.

Privacy implementation assessment results

D.

Design security review

Full Access
Question # 33

The product development team is preparing for the production deployment of recent feature enhancements. One morning, they noticed the amount of test data grew exponentially overnight. Most fields were filled with random characters, but some structured query language was discovered.

Which type of security development lifecycle (SDL) tool was likely being used?

A.

Dynamic analysis

B.

Fuzzing

C.

Threat model

D.

Static analysis

Full Access