100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
D487 Secure SW Design Exam 2024 Questions & Answers 100% Correct!! $15.99   Add to cart

Exam (elaborations)

D487 Secure SW Design Exam 2024 Questions & Answers 100% Correct!!

 0 view  0 purchase
  • Course
  • D487 Secure SW Design
  • Institution
  • D487 Secure SW Design

Which practice in the Ship (A5) phase of the security development cycle verifies whether the product meets security mandates? - ANSWER A5 policy compliance analysis Which post-release support activity defines the process to communicate, identify, and alleviate security threats? - ANSWER PRSA1:...

[Show more]

Preview 2 out of 13  pages

  • September 25, 2024
  • 13
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • D487 Secure SW Design
  • D487 Secure SW Design
avatar-seller
papersmaster01
D487 Secure SW Design Exam 2024
Questions & Answers 100% Correct!!
Which practice in the Ship (A5) phase of the security development cycle verifies whether the product
meets security mandates? - ANSWER A5 policy compliance analysis


Which post-release support activity defines the process to communicate, identify, and alleviate
security threats? - ANSWER PRSA1: External vulnerability disclosure response



What are two core practice areas of the OWASP Security Assurance Maturity Model (OpenSAMM)? -
ANSWER Governance, Construction



Which practice in the Ship (A5) phase of the security development cycle uses tools to identify
weaknesses in the product? - ANSWER Vulnerability scan



Which post-release support activity should be completed when companies are joining together? -
ANSWER Security architectural reviews



Which of the Ship (A5) deliverables of the security development cycle are performed during the A5
policy compliance analysis? - ANSWER Analyze activities and standards



Which of the Ship (A5) deliverables of the security development cycle are performed during the
code-assisted penetration testing? - ANSWER white-box security test



Which of the Ship (A5) deliverables of the security development cycle are performed during the
open-source licensing review? - ANSWER license compliance



Which of the Ship (A5) deliverables of the security development cycle are performed during the final
security review? - ANSWER Release and ship



How can you establish your own SDL to build security into a process appropriate for your
organization's needs based on agile? - ANSWER iterative development

, How can you establish your own SDL to build security into a process appropriate for your
organization's needs based on devops? - ANSWER continuous integration and continuous
deployments



How can you establish your own SDL to build security into a process appropriate for your
organization's needs based on cloud? - ANSWER API invocation processes



During what phase of SDL do all key stakeholders discuss, identify, and have common understandings
of the security and privacy implications, considerations, and requirements? - ANSWER A1 Security
Assessment



What are the three areas of focus in secure software requirements? - ANSWER Gathering the
software requirements, data classification, and managing data protection requirements



During what phase of SDL is an initial project outline for security milestones developed and
integrated into the development project schedule? - ANSWER A1 Security Assessment



What term means requirements that describe what the system will do and its core purpose? -
ANSWER functional requirements



What term means requirements that describe any constraints or restrictions on a design but do not
impact the core purpose of the system - ANSWER non-functional requirements



What term is a process that evaluates issues and privacy impact rating in relation to the privacy of
personally identifiable information in the software? - ANSWER privacy impact assessment



What term helps to determine the actual cost of the product from different perspectives? - ANSWER
product risk profile



What term is a table that lists all of the security requirements - ANSWER requirement traceability
matrix



What term is the environment in which the product will operate and potential threats in that
environment? - ANSWER threat profile

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller papersmaster01. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $15.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76658 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$15.99
  • (0)
  Add to cart