Question

In: Computer Science

Answer correctly the below 25 multiple questions on Software Development Security. Please I will appreciate the...

Answer correctly the below 25 multiple questions on Software Development Security. Please I will appreciate the Correct Answer ONLY

1. Which of the following correctly best describes an object-oriented database?

  1. When an application queries for data, it receives both the data and the procedure.
  2. It is structured similarly to a mesh network for redundancy and fast data retrieval.
  3. Subjects must have knowledge of the well-defined access path in order to access data.
  4. The relationships between data entities provide the framework for organizing data.

2. Fred has been told he needs to test a component of the new content management application under development to validate its data structure, logic, and boundary conditions. What type of testing should he carry out?

  1. Acceptance testing
  2. Regression testing
  3. Integration testing
  4. Unit testing

3. Which of the following is the best description of a component-based system development method?

  1. Components periodically revisit previous stages to update and verify design requirements
  2. Minimizes the use of arbitrary transfer control statements between components
  3. Uses independent and standardized modules that are assembled into serviceable programs
  4. Implemented in module-based scenarios requiring rapid adaptations to changing client requirements

4. There are many types of viruses that hackers can use to damage systems. Which of the following is not a correct description of a polymorphic virus?

  1. Intercepts antimalware's call to the operating system for file and system information
  2. Varies the sequence of its instructions using noise, a mutation engine, or random-number generator
  3. Can use different encryption schemes requiring different decryption routines
  4. Produces multiple varied copies of itself

5. Which of the following best describes the role of the Java Virtual Machine in the execution of Java applets?

  1. Converts the source code into bytecode and blocks the sandbox
  2. Converts the bytecode into machine-level code
  3. Operates only on specific processors within specific operating systems
  4. Develops the applets, which run in a user's browser

6. What type of database software integrity service guarantees that tuples are uniquely identified by primary key values?

  1. Concurrent integrity
  2. Referential integrity
  3. Entity integrity
  4. Semantic integrity

7. In computer programming, cohesion and coupling are used to describe modules of code. Which of the following is a favorable combination of cohesion and coupling?

  1. Low cohesion, low coupling
  2. High cohesion, high coupling
  3. Low cohesion, high coupling
  4. High cohesion, low coupling

8. Which of the following statements does not correctly describe SOAP and Remote Procedure Calls?

  1. SOAP was designed to overcome the compatibility and security issues associated with Remote Procedure Calls.
  2. Both SOAP and Remote Procedure Calls were created to enable application-layer communication.
  3. SOAP enables the use of Remote Procedure Calls for information exchange between applications over the Internet.
  4. HTTP was not designed to work with Remote Procedure Calls, but SOAP was designed to work with HTTP.

9. Which of the following is a correct description of the pros and cons associated with third-generation programming languages?

  1. The use of heuristics reduced programming effort, but the amount of manual coding for a specific task is usually more than the preceding generation.
  2. The use of syntax similar to human language reduced development time, but the language is resource intensive.
  3. The use of binary was extremely time consuming but resulted in fewer errors.
  4. The use of symbols reduced programming time, but the language required knowledge of machine architecture.

10. It can be very challenging for programmers to know what types of security should be built into the software that they create. The amount of vulnerabilities, threats, and risks involved with software development can seem endless. Which of the following describes the best first step for developers to take to identify the security controls that should be coded into a software project?

  1. Penetration testing
  2. Regression testing
  3. Threat modeling
  4. Attack surface analysis

11. Mary is creating malicious code that will steal a user's cookies by modifying the original client-side Java script. What type of cross-site scripting vulnerability is she exploiting?

  1. Second order
  2. DOM-based
  3. Persistent
  4. Nonpersistent

12. Of the following steps that describe the development of a botnet, which best describes the step that comes first?

  1. Infected server sends attack commands to the botnet.
  2. Spammer pays a hacker for use of a botnet.
  3. Controller server instructs infected systems to send spam to mail servers.
  4. Malicious code is sent out that has bot software as its payload.

13. Which of the following antimalware detection methods is the most recent to the industry and monitors suspicious code as it executes within the operating system?

  1. Behavior blocking
  2. Fingerprint detection
  3. Signature-based detection
  4. Heuristic detection

14. Which of the following describes object-oriented programming deferred commitment?

  1. Autonomous objects, which cooperate through exchanges of messages
  2. The internal components of an object can be refined without changing other parts of the system
  3. Object-oriented analysis, design, and modeling maps to business needs and solutions
  4. Other programs using same objects

15. __________________ provides a machine-readable description of the specific operations provided by a specific web service. ________________ provides a method for web services to be registered by service providers and located by service consumers.

  1. Web Services Description Language; Universal Description, Discovery and Integration
  2. Universal Description, Discovery and Integration; Web Services Description Language
  3. Web Services Description Language; Simple Object Access Protocol
  4. Simple Object Access Protocol; Universal Description, Discovery and Integration

16. Sally has found out that software programmers in her company are making changes to software components and uploading them to the main software repository without following version control or documenting their changes. This is causing a lot of confusion and has caused several teams to use the older versions. Which of the following would be the best solution for this situation?

  1. Software change control management
  2. Software escrow
  3. Software configuration management
  4. Software configuration management escrow

17. The approach of employing an integrated product team (IPT) for software development is designed to achieve which of the following objectives?

  1. Developing and testing software with fewer security flaws
  2. Developing and testing software with fewer defective features
  3. Developing and testing software that will be most profitable
  4. Developing and testing software best suited to the deployment environment

18. Which are the best reasons why a code versioning system (CVS) is an important part of a development infrastructure?

  1. It can ensure that code modifications are made according to corporate policies.
  2. It will document who made which changes to ensure accountability.
  3. It will reduce the cost of the development infrastructure.
  4. It can provide control over unauthorized access to proprietary code.
  1. i, ii, iv
  2. iii
  3. iii, iv
  4. All of the above

19. What is generally the safest, most secure way to acquire software?

  1. From a reputable vendor of proprietary software, once tested in the deployment environment
  2. Downloading very popular open-source software that has been inspected for bugs by a large and active community
  3. Downloading either proprietary or open-source software, but fuzzing it in a lab environment prior to deployment
  4. Downloading open-source software and deploying it only after the code base has been verified by cryptographic checksum

20. Cross-site scripting (XSS) is an application security vulnerability usually found in web applications. What type of XSS vulnerability occurs when a victim is tricked into opening a URL programmed with a rogue script to steal sensitive information?

  1. Persistent XSS vulnerability
  2. Nonpersistent XSS vulnerability
  3. Second-order vulnerability
  4. DOM-based vulnerability

21. Widgets, Inc.'s software development processes are documented, and the organization is capable of producing its own standard of software processes. Which of the following Capability Maturity Model Integration levels best describes Widgets, Inc.?

  1. Initial
  2. Repeatable
  3. Defined
  4. Managed

Solutions

Expert Solution

1. The answer is: When an application queries for data, it receives both the data and the procedure

2. The answer is: Integration testing

3. The answer is: Uses independent and standardized modules that are assembled into serviceable programs

4. The answer is: Intercepts anti-malware's call to the operating system for file and system information

5. The answer is: Converts the byte code into machine-level code

6. The answer is: Entity integrity

7. The answer is: High cohesion, high coupling

8. The answer is: SOAP enables the use of Remote Procedure Calls for information exchange between applications over the Internet

9. The answer is: The use of syntax similar to human language reduced development time, but the language is resource intensive

10. The answer is: Threat modeling

11. The answer is: DOM-based

12. The answer is: Malicious code is sent out that has bot software as its payload

13. The answer is: Behavior blocking

14. The answer is: The internal components of an object can be refined without changing other parts of the system

15. The answer is: Web Services Description Language; Universal Description, Discovery and Integration

16. The answer is: Software configuration management

17. The answer is: Developing and testing software best suited to the deployment environment

18. The answers are:

  • It can ensure that code modifications are made according to corporate policies.
  • It will document who made which changes to ensure accountability.
  • It can provide control over unauthorized access to proprietary code.

19. The answer is: Downloading either proprietary or open-source software, but fuzzing it in a lab environment prior to deployment

20. The answer is: Non-persistent XSS vulnerability

21. The answer is: Defined


Related Solutions

Can someone please properly answer the 3 questions listed below? I'd really appreciate it. And also,...
Can someone please properly answer the 3 questions listed below? I'd really appreciate it. And also, please (TYPE) everything out. 27- Considering a central bank for which the keeping the price level stable is much more important than stabilizing the output level. Draw the AD curve associated with this central bank. 28- Explain the binding situation and draw the Fed Rule and AD curve associated with binding situation. 29- What is stagflation?
Please answer the below questions ( I need answers for all the below questions). Thank you...
Please answer the below questions ( I need answers for all the below questions). Thank you True or False Write true if the statement is true or false if the statement is false. _______ The heart consists mainly of muscle. _______ Blood pressure is highest in veins. _______ Atherosclerosis is the buildup of plaque inside arteries. _______ Platelets are blood cells that fight infections. _______ Peripheral gas exchange takes place in the lungs. _______ Food travels from the mouth to...
Please I need a new answer for the below questions, Due to the remarkable raise and...
Please I need a new answer for the below questions, Due to the remarkable raise and advancement of technology, lots of large companies are moving forward to digitalize and virtualize how they do business internally and externally, such as virtual teams. Moreover, one of the virtual team advantages is the ability for a company to create the dream team without boundaries as it eliminates the element of desistance, core knowledge and skills limitation. With all these wonderful components there are...
Please read and answer the questions below this Mini case study. Please i need a different...
Please read and answer the questions below this Mini case study. Please i need a different answer from what is already online. Thank you Marketing Excellence Target In the mid-1980s, then-dominant Kmart and up-and-coming Walmart were both communicating their low-price promise, but their merchandise was perceived as cheap and low quality. Target, founded in 1962, sensed a gap in the market for “cheap chic” mass retail and set out to distinguish itself from the other big-box retailers by building an...
Hello! Could someone please answer this for me? I would greatly appreciate it, and will totally...
Hello! Could someone please answer this for me? I would greatly appreciate it, and will totally like your answer! Length isn't necessarily important, just needs to be accurate and such. Thanks in advance!!!!!!! (References are needed when using examples, or include the link from where you got it and I can format the reference). "Discuss the difference in the cost of items sold by a retail shoe store, the cost of items sold by a shoe manufacturer, and the cost...
I'm having difficulty understanding these questions. I would appreciate the answer with an explanation, thank you...
I'm having difficulty understanding these questions. I would appreciate the answer with an explanation, thank you ! Question 1 A one-year discount bond issued by X has a payout of $550 and today's price is $510. A one-year discount bond issued by Y has a payout of $1,290 and today's price is $1,155. Then the bond issued by X has a ____ yield than the bond issued by Y, and this could be because X has a ____ default risk...
Please answer the following questions and explain the reasons based on the CAPM. a. If security...
Please answer the following questions and explain the reasons based on the CAPM. a. If security A is riskier (has a higher volatility) than security B, what can you say about the expected return on A compared to the expected return on B? b. What should your portfolio look like? c. Should you get a higher expected return on a stock which is positively or negatively correlated with the market portfolio?
For the two preferences described below, please answer the following questions. (i) Write down a utility...
For the two preferences described below, please answer the following questions. (i) Write down a utility function that is consistent with the description of the preference. (ii) Draw indifference curve maps for the individual. Label both axis. Indicate marginal rate of substitution on your graph and whether it is diminishing. (iii) Obtain the demand function for both good x and y. (iv) Describe how an increase in income would affect John and Mary’s consumption bundles. John and Mary’s preferences are...
Please answer the questions listed below. They were the ones I got wrong. Q5: a miscalculation...
Please answer the questions listed below. They were the ones I got wrong. Q5: a miscalculation in blank 3 follows through part d. Part e blank 1 an part f blank 1 are also incorrect. Question 5 For tax purposes, “gross income” is all the money a person receives in a given year from any source. But income taxes are levied on “taxable income” rather than gross income. The difference between the two is the result of many exemptions and...
D4/MIS: Please make sure the answer should be in your won words. I would appreciate if...
D4/MIS: Please make sure the answer should be in your won words. I would appreciate if you provide the articles Read four (4) academically reviewed articles on Net Neutrality and Summarize all four (4) articles in at least 30 sentences words or more.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT