Secure Software Requirements & Design | Test-3
These assessments examine your ability to define and implement security-focused software requirements. They address fundamental concepts such as threat modeling, risk assessment, secure design patterns, and applying security controls into the software development phase. These tests are ideal for developers and security experts who want to construct secure apps from the ground up. They provide a solid basis for eliminating vulnerabilities early in the development lifecycle.
1 / 20
1. In the requirements phase of the SDLC, the process of extracting specific software security requirements from high-level organizational and regulatory directives and mandates is also referred to as
The correct answer is Policy decomposition.
Policy decomposition refers to the process of extracting specific software security requirements from high-level organizational and regulatory directives, mandates, and policies. It involves breaking down these broader directives into actionable, detailed security requirements that can be implemented in the software development process.
Hereโs a brief overview of the other options:
2 / 20
2. When considering secure software architecture, which approach provides the most comprehensive protection against a wide range of attack vectors?
The correct answer is Applying a multi-layered security strategy combining defense-in-depth, least privilege, and continuous monitoring.
A multi-layered security strategy provides the most comprehensive protection against a wide range of attack vectors. This approach includes:
This combination provides robust, overlapping layers of defense and proactive measures, making it harder for attackers to exploit vulnerabilities or gain unauthorized access.
3 / 20
3. When does threat modeling begin in the software development lifecycle (SDLC)?
The correct answer is During Solution Design.
Threat modeling typically begins during the solution design phase of the Software Development Lifecycle (SDLC). This is when architects and developers design the system, and identifying potential threats early in this phase allows them to incorporate security controls into the architecture from the start. By assessing possible vulnerabilities and attack vectors at this stage, security can be built into the system design, which is more efficient and cost-effective than trying to fix security issues later.
4 / 20
4. Which of the following data is NOT subject to high confidentiality obligations?
The data that is not typically subject to high confidentiality obligations is
userโs privileges
While the information about user privileges (e.g., what access rights a user has) is important for security and access control, it is generally not considered as sensitive or confidential as personally identifiable information (PII), software architecture and network diagrams, or customers' cardholder data.
5 / 20
5. Which among the following methods is the best way to protect Personally Identifiable Information (PII) from being leaked due to vulnerabilities of various web applications?
Using cryptographic storage involves encrypting PII before storing it, adding an additional layer of protection. Even if there's unauthorized access or a vulnerability in the application, the encrypted PII remains unreadable without the proper decryption key.
6 / 20
6. What is the purpose of a security requirements traceability matrix (RTM) in software development?
Mapping security requirements to corresponding design and implementation elements. The primary purpose of a security requirements traceability matrix is to establish and track the relationship between security requirements and the design and implementation components of the software.
7 / 20
7. Which design principle ensures that every access to every resource is checked for appropriate permissions?
The design principle that ensures every access to every resource is checked for appropriate permissions is : Complete Mediation
This principle requires that access to every resource must be verified to ensure that it is allowed. This prevents unauthorized access by ensuring that all access attempts are properly authenticated and authorized.
8 / 20
8. Which of the following body provides information about latest trends for web application attacks?
The correct answer is OWASP Top 10.
The OWASP (Open Web Application Security Project) Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications and is updated regularly to reflect the latest trends and emerging threats.
9 / 20
9. What is the purpose of implementing the fail-secure principle?
The correct answer is to ensure systems default to a secure state in case of failure.
The fail-secure principle ensures that if a system fails, it defaults to a secure state rather than leaving the system open to exploitation. This principle is important in security-critical systems to prevent unauthorized access or potential breaches when an unexpected failure occurs.
10 / 20
10. Which secure design principle advocates for the security mechanisms to be as small and simple as possible?
The secure design principle that advocates for the security mechanisms to be as small and simple as possible is : Economy of Mechanism
This principle emphasizes that simplicity in design reduces the likelihood of errors and vulnerabilities, making the security mechanisms easier to understand, implement, and manage.
The secure design principle that advocates for the security mechanisms to be as small and simple as possible is :Economy of Mechanism
11 / 20
11. Which of the following is least likely to be detected via misusecase modeling?
The least likely to be detected via misuse case modeling is "Race conditions" (Option 3). Misuse case modeling primarily focuses on security-related issues and malicious activities, rather than non-security issues related to concurrency and timing, which are characteristic of race conditions.
12 / 20
12. What should a secure software requirement for error handling prioritize?
All of the above. Comprehensive error handling ensures user experience, logging for analysis, and vulnerability protection.
13 / 20
13. Which security measure among the following is essential for protecting against man-in-the-middle(MiTM) attacks?
The correct answer is Transport Layer Security (TLS).
Transport Layer Security (TLS) is essential for protecting against man-in-the-middle (MiTM) attacks. TLS encrypts data transmitted between clients and servers, ensuring that even if a malicious actor intercepts the communication, they cannot read or alter the data without the proper encryption keys. This encryption helps to ensure the confidentiality and integrity of the transmitted data, which is key to preventing MiTM attacks.
14 / 20
14. How should secure software requirements address data backup and recovery?
All of the above. A comprehensive approach ensures efficient backups, recovery plans, and secure storage.
15 / 20
15. Which of the following standards are associated with protection of credit cards data?
PCI DSS is a set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment. It is not only a standard but also a set of best practices for securing payment card data.
16 / 20
16. What should the design document include apart from design artifacts?
The design document should include Application security information and guidance such as recommended tools, components, encryption & hashing algorithms, etc.
Including this information ensures that security considerations are integrated into the design process, guiding developers on best practices and tools to use for implementing robust security measures.
17 / 20
17. Which of the following should a log statement contain for accountability?
Each security event logged to a log file must include the following: An accurate date and time stamp synchronized with the UTC approved time service.
The event's origin (such as terminal identification, IP address, hostname, program command, daemon process, user ID, and so on).
The activity being recorded (such as the category or type of event).
18 / 20
18. What is the last step in theย Threat Modelling process:
Step 1: Decomposing the Application
Step 2: Determining and ranking threats
Step 3:___________________________.
Determining countermeasures and mitigation for the threats is the last step of Threat modelling process
19 / 20
19. Which security design principle is most effective in mitigating the risk posed by insiders with legitimate access to the system?
The correct answer is Separation of Duties.
Separation of Duties (SoD) is a security design principle that helps mitigate the risk posed by insiders with legitimate access by ensuring that critical tasks are divided among multiple individuals. This reduces the chance that a single individual can misuse their access to carry out malicious actions without oversight. For example, separating responsibilities between those who request a transaction and those who approve it can prevent fraud or unauthorized activities.
20 / 20
20. Which among the following is the BEST secure software requirement related to session management?
Implementing session timeout is a crucial security measure in session management for web applications. It involves automatically terminating a user's session after a predefined period of inactivity.
Significance:
Security Against Unauthorized Access: Session timeout helps mitigate the risk of unauthorized access to a user's account if they forget to log out or if their session is left unattended. It ensures that even if an authenticated session is open, it becomes invalid after a certain period of inactivity.
Protection Against Session Hijacking: If a user's session is compromised, a session timeout reduces the window of opportunity for attackers to misuse the session. It limits the time available for malicious actors to exploit a stolen session.
Compliance with Security Best Practices: Many security frameworks and best practices recommend implementing session timeout as a fundamental security control. It aligns with principles such as the Principle of Least Privilege and ensures that access privileges are not prolonged unnecessarily.
Your score is
The average score is 0%
Restart Test
Related challenges :