Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Automated security testing was performed by attempting to log in to the new product with a known username using a collection of passwords. Access was granted after a few hundred attempts.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure passwords are encrypted when stored in persistent data stores

B.

Ensure authentication controls are resistant to brute force attacks

C.

Ensure strong password policies are enforced

D.

Ensure credentials and authentication tokens are encrypted during transit

Which DREAD category is based on how easily a threat exploit can be found?

A.

Damage Potential

B.

Affected Users

C.

Discoverability

D.

Reproducibility

The security team contracts with an independent security consulting firm to simulate attacks on deployed products and report results to organizational leadership.

Which category of secure software best practices is the team performing?

A.

Attack models

B.

Code review

C.

Architecture analysis

D.

Penetration testing

What refers to the review of software source code by developers other than the original coders to try to identify oversights, mistakes, assumptions, a lack of knowledge, or even experience?

A.

User acceptance testing

B.

Manual peer review

C.

Fault injection

D.

Dynamic code review

A recent vulnerability scan uncovered an XML external entity (XXE) Haw that could allow attackers to return the contents of a system file by including a specific payload in an XML request.

How should the organization remediate this vulnerability?

A.

Ensure audit trails exist for all sensitive transactions

B.

Disable resolution of external entities in the parsing library

C.

Enforce role-based authorization in all application layers

D.

Ensure authentication cookies are encrypted

Which type of security analysis is performed by injecting malformed data into open interfaces of an executable or running application and is most commonly executed during the testing or deployment phases of the SDLC?

A.

Static Analysis

B.

Fuzz Testing

C.

Dynamic Analysis

D.

Manual Code Review

During penetration testing, an analyst was able to create hundreds of user accounts by executing a script that sent individual requests to the registration endpoint.

How should the organization remediate this vulnerability?

A.

Use a Tool Like CAPTCHA to Prevent Batched Registrations and Bots

B.

Enforce Strong Password Complexity Standards

C.

Enforce Idle Time-Outs on Session IDs

D.

Ensure All Data Is Encrypted in Transit

Company leadership has discovered an untapped revenue stream within its customer base and wants to meet with IT to share its vision for the future and determine whether to move forward.

Which phase of the software development lifecycle (SDLC) is being described?

A.

Implementation

B.

Design

C.

Planning

D.

Requirements

Which secure coding best practice says to use a single application-level authorization component that will lock down the application if it cannot access its configuration information?

A.

Access control

B.

Data protection

C.

Session management

D.

Communication security

Which security assessment deliverable identities possible security vulnerabilities in the product?

A.

SDL project outline

B.

Metrics template

C.

Threat profile

D.

List of third-party software