Which software control test examines an application from a user perspective by providing a wide variety of input scenarios and inspecting the output?
Which secure coding best practice ensures sensitive information is not disclosed in any responses to users, authorized or unauthorized?
Automated security testing was performed by attempting to log in to the new product with a known username using a collection of passwords. Access was granted after a few hundred attempts.
How should existing security controls be adjusted to prevent this in the future?
During fuzz testing of the new product, random values were entered into input elements Search requests were sent to the correct API endpoint but many of them failed on execution due to type mismatches.
How should existing security controls be adjusted to prevent this in the future?
Which mitigation technique can be used to light against a threat where a user may gain access to administrator level functionality?
What is one of the tour core values of the agile manifesto?
The security team is reviewing all noncommercial software libraries used in the new product to ensure they are being used according to the legal specifications defined by the authors.
What activity of the Ship SDL phase is being performed?
The security testing team received a report from one of the contracted penetration testing vendors that details a flaw discovered in the login component of the new software product, along with a recommended fix.
Which phase of the penetration testing process is the team in?
The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP SAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.
Which OpenSAMM business function is being assessed?
Which secure coding best practice says to only use tested and approved components and use task-specific, built-in APIs to conduct operating system functions?