Secure Software Requirements & Design | Test-3

0%
0

Secure Software Requirements & Design | Test-3

These assessments examine your ability to define and implement security-focused software requirements. They address fundamental concepts such as threat modeling, risk assessment, secure design patterns, and applying security controls into the software development phase. These tests are ideal for developers and security experts who want to construct secure apps from the ground up. They provide a solid basis for eliminating vulnerabilities early in the development lifecycle.

1 / 20

1. In the requirements phase of the SDLC, the process of extracting specific software security requirements from high-level organizational and regulatory directives and mandates is also referred to as

2 / 20

2. When considering secure software architecture, which approach provides the most comprehensive protection against a wide range of attack vectors?

3 / 20

3. When does threat modeling begin in the software development lifecycle (SDLC)?

4 / 20

4. Which of the following data is NOT subject to high confidentiality obligations?

5 / 20

5. Which among the following methods is the best way to protect Personally Identifiable Information (PII) from being leaked due to vulnerabilities of various web applications?

6 / 20

6. What is the purpose of a security requirements traceability matrix (RTM) in software development?

7 / 20

7. Which design principle ensures that every access to every resource is checked for appropriate permissions?

8 / 20

8. Which of the following body provides information about latest trends for web application attacks?

9 / 20

9. What is the purpose of implementing the fail-secure principle?

10 / 20

10. Which secure design principle advocates for the security mechanisms to be as small and simple as possible?

11 / 20

11. Which of the following is least likely to be detected via misuse
case modeling?

12 / 20

12. What should a secure software requirement for error handling prioritize?

13 / 20

13. Which security measure among the following is essential for protecting against man-in-the-middle(MiTM) attacks?

14 / 20

14. How should secure software requirements address data backup and recovery?

15 / 20

15. Which of the following standards are associated with protection of credit cards data?

16 / 20

16. What should the design document include apart from design artifacts?

17 / 20

17. Which of the following should a log statement contain for accountability?

18 / 20

18. What is the last step in theย  Threat Modelling process:

Step 1: Decomposing the Application

Step 2: Determining and ranking threats

Step 3:___________________________.

 

19 / 20

19. Which security design principle is most effective in mitigating the risk posed by insiders with legitimate access to the system?

20 / 20

20. Which among the following is the BEST secure software requirement related to session management?

Your score is

The average score is 0%

0%

Related challenges :