100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
D487 Secure SW Design €10,46   In winkelwagen

Tentamen (uitwerkingen)

D487 Secure SW Design

 0 keer bekeken  0 keer verkocht
  • Vak
  • TNCC
  • Instelling
  • TNCC

D487 Secure SW Design Which practice in the Ship (A5) phase of the security development cycle verifies whether the product meets security mandates? - ANS A5 policy compliance analysis Which post-release support activity defines the process to communicate, identify, and all...

[Meer zien]

Voorbeeld 2 van de 11  pagina's

  • 23 oktober 2024
  • 11
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • TNCC
  • TNCC
avatar-seller
D487 Secure SW Design



Which practice in the Ship (A5) phase of the security development cycle verifies whether the
product meets security mandates? - ANS A5 policy compliance analysis

Which post-release support activity defines the process to communicate, identify, and alleviate
security threats? - ANS PRSA1: External vulnerability disclosure response

What are two core practice areas of the OWASP Security Assurance Maturity Model
(OpenSAMM)? - ANS Governance, Construction

Which practice in the Ship (A5) phase of the security development cycle uses tools to identify
weaknesses in the product? - ANS Vulnerability scan

Which post-release support activity should be completed when companies are joining together?
- ANS Security architectural reviews

Which of the Ship (A5) deliverables of the security development cycle are performed during the
A5 policy compliance analysis? - ANS Analyze activities and standards

Which of the Ship (A5) deliverables of the security development cycle are performed during the
code-assisted penetration testing? - ANS white-box security test

Which of the Ship (A5) deliverables of the security development cycle are performed during the
open-source licensing review? - ANS license compliance

Which of the Ship (A5) deliverables of the security development cycle are performed during the
final security review? - ANS Release and ship

How can you establish your own SDL to build security into a process appropriate for your
organization's needs based on agile? - ANS iterative development

How can you establish your own SDL to build security into a process appropriate for your
organization's needs based on devops? - ANS continuous integration and continuous
deployments

, How can you establish your own SDL to build security into a process appropriate for your
organization's needs based on cloud? - ANS API invocation processes

How can you establish your own SDL to build security into a process appropriate for your
organization's needs based on digital enterprise? - ANS enables and improves business
activities

Which phase of penetration testing allows for remediation to be performed? - ANS Deploy

Which key deliverable occurs during post-release support? - ANS third-party reviews

Which business function of OpenSAMM is associated with governance? - ANS Policy and
compliance

Which business function of OpenSAMM is associated with construction? - ANS Threat
assessment

Which business function of OpenSAMM is associated with verification? - ANS Code review

Which business function of OpenSAMM is associated with deployment? - ANS
Vulnerability management

What is the product risk profile? - ANS A security assessment deliverable that estimates
the actual cost of the product.

A software security team member has been tasked with creating a deliverable that provides
details on where and to what degree sensitive customer information is collected, stored, or
created within a new product offering. What does the team member need to deliver in order to
meet the objective? - ANS Privacy impact assessment

What is the first phase in the security development life cycle? - ANS A1 Security
Assessment

What are the three areas of compliance requirements? - ANS Legal, financial, and industry
standards

What term refers to how the system should function based on the environment in which the
system will operate? - ANS operational requirements

During what phase of SDL do all key stakeholders discuss, identify, and have common
understandings of the security and privacy implications, considerations, and requirements? -
ANS A1 Security Assessment

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper DocLaura. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €10,46. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 85651 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€10,46
  • (0)
  Kopen