Secure Software Requirements & Design | Test-4

0%
0

Secure Software Requirements & Design | Test-4

These assessments examine your ability to define and implement security-focused software requirements. They address fundamental concepts such as threat modeling, risk assessment, secure design patterns, and applying security controls into the software development phase. These tests are ideal for developers and security experts who want to construct secure apps from the ground up. They provide a solid basis for eliminating vulnerabilities early in the development lifecycle.

1 / 20

1. How does implementing a robust audit trail contribute to the principle of accountability in information security?

2 / 20

2. Which of the following strategies best addresses the issue of data integrity during both storage and transmission?

3 / 20

3. Select the BEST response. System configurable options for credential management, auditing, and exception logging must be done via:

4 / 20

4. Which security design principle is most effective in mitigating Denial-of-Service (DoS) attacks?

5 / 20

5. A website was easily accessible to a hacker. Using the website's frontend user login form, he was able to log in with either the default or frequently used credentials. This misuse serves as an illustration of which of the following secure software deployment flaw?

6 / 20

6. Among the following security control types, recording application events for later audit reviewโ€”such as failed login attempts, market price adjustments for products, and user role changesโ€”is an example of?

7 / 20

7. Which of the following Database structures helps in implementing data abstraction and setting security and access controls?

8 / 20

8. What is the purpose of incorporating security patterns in the design phase of software development?

9 / 20

9. When specifying requirements for secure logging, what should be prioritized?

10 / 20

10. How does the concept of "least common mechanism" contribute to secure software design?

11 / 20

11. A zoo management on their website has a maximum of 10 guests before asking a deposit and offers group booking discounts. Attackers might use this flow as a threat model to see if they could quickly and easily reserve 300,000 guests across all zoos across the country, resulting in a huge loss of revenue. What kind of security issue is this?

12 / 20

12. What is the significance of a threat modeling technique known as "DREAD"?

13 / 20

13. Attack surface analysis should document the various entry and exit points into the system such as:

14 / 20

14. Which type of user account privilege should be used to access database from the application?

15 / 20

15. Which statement best describes the "deny-by-default" security design principle?

16 / 20

16. Which of the following security control prevents access to compromised user accounts data including passwords?

17 / 20

17. Which of the following should be consideredย  for secure session management

18 / 20

18. Which of the following should be considered for secure passwords requirements

19 / 20

19. Which of the following is NOT a recommended approach for secure data storage?

20 / 20

20. When designing a secure password reset mechanism, which of the following options is MOST secure?

Your score is

The average score is 0%

0%

Related challenges :