In: Computer Science
Answer correctly the below 25 multiple questions on Software Development Security. Please I will appreciate the Correct Answer ONLY
1. Which of the following correctly best describes an object-oriented database?
2. Fred has been told he needs to test a component of the new content management application under development to validate its data structure, logic, and boundary conditions. What type of testing should he carry out?
3. Which of the following is the best description of a component-based system development method?
4. There are many types of viruses that hackers can use to damage systems. Which of the following is not a correct description of a polymorphic virus?
5. Which of the following best describes the role of the Java Virtual Machine in the execution of Java applets?
6. What type of database software integrity service guarantees that tuples are uniquely identified by primary key values?
7. In computer programming, cohesion and coupling are used to describe modules of code. Which of the following is a favorable combination of cohesion and coupling?
8. Which of the following statements does not correctly describe SOAP and Remote Procedure Calls?
9. Which of the following is a correct description of the pros and cons associated with third-generation programming languages?
10. It can be very challenging for programmers to know what types of security should be built into the software that they create. The amount of vulnerabilities, threats, and risks involved with software development can seem endless. Which of the following describes the best first step for developers to take to identify the security controls that should be coded into a software project?
11. Mary is creating malicious code that will steal a user's cookies by modifying the original client-side Java script. What type of cross-site scripting vulnerability is she exploiting?
12. Of the following steps that describe the development of a botnet, which best describes the step that comes first?
13. Which of the following antimalware detection methods is the most recent to the industry and monitors suspicious code as it executes within the operating system?
14. Which of the following describes object-oriented programming deferred commitment?
15. __________________ provides a machine-readable description of the specific operations provided by a specific web service. ________________ provides a method for web services to be registered by service providers and located by service consumers.
16. Sally has found out that software programmers in her company are making changes to software components and uploading them to the main software repository without following version control or documenting their changes. This is causing a lot of confusion and has caused several teams to use the older versions. Which of the following would be the best solution for this situation?
17. The approach of employing an integrated product team (IPT) for software development is designed to achieve which of the following objectives?
18. Which are the best reasons why a code versioning system (CVS) is an important part of a development infrastructure?
19. What is generally the safest, most secure way to acquire software?
20. Cross-site scripting (XSS) is an application security vulnerability usually found in web applications. What type of XSS vulnerability occurs when a victim is tricked into opening a URL programmed with a rogue script to steal sensitive information?
21. Widgets, Inc.'s software development processes are documented, and the organization is capable of producing its own standard of software processes. Which of the following Capability Maturity Model Integration levels best describes Widgets, Inc.?
1. The answer is: When an application queries for data, it receives both the data and the procedure
2. The answer is: Integration testing
3. The answer is: Uses independent and standardized modules that are assembled into serviceable programs
4. The answer is: Intercepts anti-malware's call to the operating system for file and system information
5. The answer is: Converts the byte code into machine-level code
6. The answer is: Entity integrity
7. The answer is: High cohesion, high coupling
8. The answer is: SOAP enables the use of Remote Procedure Calls for information exchange between applications over the Internet
9. The answer is: The use of syntax similar to human language reduced development time, but the language is resource intensive
10. The answer is: Threat modeling
11. The answer is: DOM-based
12. The answer is: Malicious code is sent out that has bot software as its payload
13. The answer is: Behavior blocking
14. The answer is: The internal components of an object can be refined without changing other parts of the system
15. The answer is: Web Services Description Language; Universal Description, Discovery and Integration
16. The answer is: Software configuration management
17. The answer is: Developing and testing software best suited to the deployment environment
18. The answers are:
19. The answer is: Downloading either proprietary or open-source software, but fuzzing it in a lab environment prior to deployment
20. The answer is: Non-persistent XSS vulnerability
21. The answer is: Defined