Deck 11: Defense in Depth, Software Development, and Data Analytics

ملء الشاشة (f)
exit full mode
سؤال
A layer of protection called ______________ (from Greek words meaning "hidden writing") is the practice of transforming information so it is secure and cannot be accessed by unauthorized parties.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What aspect of job rotation requires teaching employees to perform multiple job functions besides the ones for which they were hired?
سؤال
Which of the following security protections afforded by cryptography ensures that only authorized parties can view information?

A) Integrity
B) Confidentiality
C) Authentication
D) Non-repudiation
سؤال
The costs associated with providing cybersecurity protections have plateaued and will probably remain constant over the next few years.
سؤال
In which of the following cloud services does the customer has the highest level of control?

A) Software as a service (SaaS)
B) Platform as a service (PaaS)
C) Infrastructure as a service (IaaS)
D) Virtualization as a service (VaaS)
سؤال
What is another name for dynamic code analysis?
سؤال
In the context of cybersecurity, what is fuzzing?
سؤال
What element of quality assurance helps to ensure that resolved prior vulnerabilities continue to stay secure and that changes to the code do not inadvertently create new flaws that can break the application or cause unwanted results?
سؤال
Which of the following SDLC best practices determines if software can withstand the workload placed on it without crashing and includes verification that the software can respond in a timely fashion to a high number of simultaneous users?

A) Security requirements definition
B) User acceptance testing
C) Input validation
D) Application stress testing
سؤال
To ensure an efficient process, software testing should only be performed after coding is completed.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Defense in Depth, Software Development, and Data Analytics
1
A layer of protection called ______________ (from Greek words meaning "hidden writing") is the practice of transforming information so it is secure and cannot be accessed by unauthorized parties.
Cryptography
2
What aspect of job rotation requires teaching employees to perform multiple job functions besides the ones for which they were hired?
Cross training
3
Which of the following security protections afforded by cryptography ensures that only authorized parties can view information?

A) Integrity
B) Confidentiality
C) Authentication
D) Non-repudiation
Confidentiality
4
The costs associated with providing cybersecurity protections have plateaued and will probably remain constant over the next few years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
In which of the following cloud services does the customer has the highest level of control?

A) Software as a service (SaaS)
B) Platform as a service (PaaS)
C) Infrastructure as a service (IaaS)
D) Virtualization as a service (VaaS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is another name for dynamic code analysis?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
In the context of cybersecurity, what is fuzzing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
What element of quality assurance helps to ensure that resolved prior vulnerabilities continue to stay secure and that changes to the code do not inadvertently create new flaws that can break the application or cause unwanted results?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following SDLC best practices determines if software can withstand the workload placed on it without crashing and includes verification that the software can respond in a timely fashion to a high number of simultaneous users?

A) Security requirements definition
B) User acceptance testing
C) Input validation
D) Application stress testing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
To ensure an efficient process, software testing should only be performed after coding is completed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.