Pass the WGU Courses and Certificates Secure-Software-Design Questions and answers with CertsForce

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

The security software team has cloned the source code repository of the new software product so they can perform vulnerability testing by modifying or adding small snippets of code to see if they can cause unexpected behavior and application failure.

Which security testing technique is being used?

Options:

A.

Source-Code Fault Injection


B.

Dynamic Code Analysis


C.

Fuzz Testing


D.

Binary Fault Injection


Expert Solution
Questions # 32:

Which secure coding best practice ensures sensitive information is not disclosed in any responses to users, authorized or unauthorized?

Options:

A.

Authentication and Password Management


B.

Input Validation


C.

System Configuration


D.

Error Handling and Logging


Expert Solution
Questions # 33:

The software security team has been tasked with assessing a document management application that has been in use for many years and developing a plan to ensure it complies with organizational policies.

Which post-release deliverable is being described?

Options:

A.

Security strategy tor M&A products


B.

Security strategy for legacy code


C.

Post-release certifications


D.

External vulnerability disclosure response process


Expert Solution
Questions # 34:

Senior IT staff has determined that a new product will be hosted in the cloud and will support web and mobile users. Developers will need to deliver secure REST services. Android and IOS mobile apps. and a web application. Developers are currently determining how to deliver each part of the overall product.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Maintenance


B.

End of life


C.

Deployment


D.

Design


Expert Solution
Questions # 35:

What refers to the review of software source code by developers other than the original coders to try to identify oversights, mistakes, assumptions, a lack of knowledge, or even experience?

Options:

A.

User acceptance testing


B.

Manual peer review


C.

Fault injection


D.

Dynamic code review


Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions