100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
D487 Secure SW Design $10.99   Add to cart

Exam (elaborations)

D487 Secure SW Design

 0 view  0 purchase
  • Course
  • TNCC
  • Institution
  • TNCC

D487 Secure SW Design Which practice in the Ship (A5) phase of the security development cycle verifies whether the product meets security mandates? - ANS A5 policy compliance analysis Which post-release support activity defines the process to communicate, identify, and all...

[Show more]

Preview 2 out of 11  pages

  • October 23, 2024
  • 11
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • TNCC
  • TNCC
avatar-seller
DocLaura
D487 Secure SW Design



Which practice in the Ship (A5) phase of the security development cycle verifies whether the
product meets security mandates? - ANS A5 policy compliance analysis

Which post-release support activity defines the process to communicate, identify, and alleviate
security threats? - ANS PRSA1: External vulnerability disclosure response

What are two core practice areas of the OWASP Security Assurance Maturity Model
(OpenSAMM)? - ANS Governance, Construction

Which practice in the Ship (A5) phase of the security development cycle uses tools to identify
weaknesses in the product? - ANS Vulnerability scan

Which post-release support activity should be completed when companies are joining together?
- ANS Security architectural reviews

Which of the Ship (A5) deliverables of the security development cycle are performed during the
A5 policy compliance analysis? - ANS Analyze activities and standards

Which of the Ship (A5) deliverables of the security development cycle are performed during the
code-assisted penetration testing? - ANS white-box security test

Which of the Ship (A5) deliverables of the security development cycle are performed during the
open-source licensing review? - ANS license compliance

Which of the Ship (A5) deliverables of the security development cycle are performed during the
final security review? - ANS Release and ship

How can you establish your own SDL to build security into a process appropriate for your
organization's needs based on agile? - ANS iterative development

How can you establish your own SDL to build security into a process appropriate for your
organization's needs based on devops? - ANS continuous integration and continuous
deployments

, How can you establish your own SDL to build security into a process appropriate for your
organization's needs based on cloud? - ANS API invocation processes

How can you establish your own SDL to build security into a process appropriate for your
organization's needs based on digital enterprise? - ANS enables and improves business
activities

Which phase of penetration testing allows for remediation to be performed? - ANS Deploy

Which key deliverable occurs during post-release support? - ANS third-party reviews

Which business function of OpenSAMM is associated with governance? - ANS Policy and
compliance

Which business function of OpenSAMM is associated with construction? - ANS Threat
assessment

Which business function of OpenSAMM is associated with verification? - ANS Code review

Which business function of OpenSAMM is associated with deployment? - ANS
Vulnerability management

What is the product risk profile? - ANS A security assessment deliverable that estimates
the actual cost of the product.

A software security team member has been tasked with creating a deliverable that provides
details on where and to what degree sensitive customer information is collected, stored, or
created within a new product offering. What does the team member need to deliver in order to
meet the objective? - ANS Privacy impact assessment

What is the first phase in the security development life cycle? - ANS A1 Security
Assessment

What are the three areas of compliance requirements? - ANS Legal, financial, and industry
standards

What term refers to how the system should function based on the environment in which the
system will operate? - ANS operational requirements

During what phase of SDL do all key stakeholders discuss, identify, and have common
understandings of the security and privacy implications, considerations, and requirements? -
ANS A1 Security Assessment

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller DocLaura. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

85651 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart