Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A potential threat was discovered during automated system testing when a PATCH request sent to the API caused an unhandled server exception. The API only supports GET. POST. PUT, and DELETE requests.

How should existing security controls be adjusted to prevent this in the future?

A.

Property configure acceptable API requests

B.

Enforce role-based authorization

C.

Use API keys to enforce authorization of every request

D.

Ensure audit logs are in place for sensitive transactions

The security team is reviewing whether changes or open issues exist that would affect requirements for handling personal information documented in earlier phases of the development life cycle.

Which activity of the Ship SDL phase is being performed?

A.

Vulnerability scan

B.

Final security review

C.

Open-source licensing review

D.

Final privacy review

Which software-testing technique can be automated or semi-automated and provides invalid, unexpected, or random data to the inputs of a computer software program?

A.

Fuzzing

B.

Static analysis

C.

Dynamic analysis

D.

Bugtraq

Which secure coding best practice says to ensure that buffers are allocated correctly and at the right size, that input strings are truncated to a reasonable length, and that resources, connections, objects, and file handles are destroyed once the application no longer needs them?

A.

Input Validation

B.

Memory Management

C.

Session Management

D.

Data Protection

Which privacy impact statement requirement type defines processes to keep personal information updated and accurate?

A.

Access requirements

B.

Collection of personal information requirements

C.

Data integrity requirements

D.

Personal information retention requirements

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's customer portal. The base score of the vulnerability was 9.9 and changed to 8.0 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

A.

Medium severity

B.

Critical severity

C.

Low severity

D.

High severity

Which question reflects the security change management component of the change management process?

A.

How critical is the software to meeting the customers' mission?

B.

What threats are possible in the environment where the software will be operating?

C.

Which security objectives are required by the software?

D.

How is remote administration secured?

During fuzz testing of the new product, random values were entered into input elements Search requests were sent to the correct API endpoint but many of them failed on execution due to type mismatches.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure all user input data is validated prior to transmitting requests

B.

Ensure all requests and responses are encrypted

C.

Ensure sensitive transactions can be traced through an audit log

D.

Ensure the contents of authentication cookies are encrypted

What is the privacy impact rating of an application that stores personally identifiable information, monitors users with ongoing transfers of anonymous data, and changes settings without notifying the user?

A.

P1 high privacy risk

B.

P2 moderate privacy risk

C.

P3 low privacy risk

D.

P4 no privacy risk

A public library needs to implement security control on publicly used computers to prevent illegal downloads.

Which security control would prevent this threat?

A.

Nonrepudiation

B.

Authentication

C.

Integrity

D.

Availability