최신 Courses and Certificates Secure-Software-Design 무료샘플문제:
1. Credit card numbers are encrypted when stored in the database but are automatically decrypted when data is fetched. The testing tool intercepted the GET response, and testers were able to view credit card numbers as clear text.
How should the organization remediate this vulnerability?
A) Ensure all data in transit is encrypted
B) Enforce role-based authorization controls in all application layers
C) Never cache sensitive data
D) Ensure there is an audit trail for all sensitive transactions
2. Due to positive publicity from the release of the new software product, leadership has decided that it is in the best interests of the company to become ISO 27001 compliant. ISO 27001 is the leading international standard focused on information security.
Which security development life cycle deliverable is being described?
A) Security strategy for M&A products
B) External vulnerability disclosure response process
C) Post-release certifications
D) Third-party security review
3. Which secure coding best practice says to use well-vetted algorithms to ensure that the application uses random identifiers, that identifiers are appropriately restricted to the application, and that user processes are fully terminated on logout?
A) Session Management
B) Input Validation
C) Output Encoding
D) Access Control
4. During fuzz testing of the new product, an exception was thrown on the order entry view, which caused a full stack dump to be displayed in the browser window that included function names from the source code.
How should existing security controls be adjusted to prevent this in the future?
A) Ensure sensitive information is scrubbed from all error messages
B) Ensure private information is not logged
C) Ensure all exceptions are handled in a standardized way
D) Ensure privileges are restored after application exceptions
5. The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP OpenSAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.
Which OpenSAMM business function is being assessed?
A) Construction
B) Governance
C) Deployment
D) Verification
질문과 대답:
질문 # 1 정답: A | 질문 # 2 정답: C | 질문 # 3 정답: A | 질문 # 4 정답: C | 질문 # 5 정답: D |