Solution architectures often contain diagrams like the one below. What does this diagram show? Reaskly questions

Practice More Questions From: Application Testing Graded Assessment

Q:

True or False. A security architect’s job is to make sure that security considerations are balanced against other design aspects such as usability, resilience and cost.

Q:

Which of these is an aspect of an Enterprise Architecture?

Q:

Which of these is an aspect of a Solution Architecture?

Q:

Which three (3) of these are features of Architecture Building Blocks (ABBs)? (Select 3)

Q:

Which three (3) of these are Architecture Building Blocks (ABBs)? (Select 3)

Q:

Which three (3) of these are Solution Building Blocks (SBBs)? (Select 3)

Q:

The diagram below shows which level of architecture?

Q:

Solution architectures often contain diagrams like the one below. What does this diagram show?

Q:

Solution architectures often contain diagrams like the one below. What does this diagram show?

Q:

What is lacking in a security architecture pattern that prevents it from being used as a finished design?

Q:

What are the possible consequences if a bug in your application becomes known?

Q:

What was the ultimate consequence to Target Stores in the United States from their 2013 data breach in which over 100M records were stolen?

Q:

Select the two (2) top vulnerabilities found in common security products. (Select 2)

Q:

True or False. If you can isolate your product from the Internet, it is safe from being hacked.

Q:

Which three (3) things can Cross-site scripting be used for? (Select 3)

Q:

True or False. Commonly a Reflect XSS attack is sent as part of an Email or a malicious link and affects only the the user who receives the Email or link.

Q:

Cross-site scripting attacks can be minimized by using HTML and URL Encoding. How would a browser display this string?: <b>Password</b>

Q:

Which three (3) statements about whitelisting user input are true? (Select 3)

Q:

Which two (2) statements are considered good practice for avoiding XSS attacks (Select 2)

Q:

How would you classify a hactivist group who thinks that your company’s stance on climate change threatens the survival of the planet?

Q:

Which software development lifecycle is characterized by short bursts of analysis, design, coding and testing during a series of 1 to 4 week sprints?

Q:

Which software development lifecycle is characterized by a series of cycles and an emphasis on security?

Q:

Which form of penetration testing allows the testers no knowledge of the systems they are trying to penetrate in advance of their attack to simulate an external attack by hackers with no knowledge of an organizations systems?

Q:

Which application testing method requires a URL to the application, is quick and cheap but also produces the most false-positive results?

Q:

Which type of application attack would include buffer overflow, cross-site scripting, and SQL injection?

Q:

Which type of application attack would include unauthorized access to configuration stores, unauthorized access to administration interfaces and over-privileged process and service accounts?

Q:

Which one of the OWASP Top 10 Application Security Risks would occur when authentication and session management functions are implemented incorrectly allowing attackers to compromise passwords, keys or session tokens.

Q:

Which one of the OWASP Top 10 Application Security Risks would occur when restrictions on what a user is allowed to do is not properly enforced?

Q:

Which of these threat modeling methodologies is integrated seamlessly into an Agile development methodology?

Q:

Security standards do not have the force of law but security regulations do. Which one of these is a security regulation?

Q:

Which phase of DevSecOps would contain the activities Secure application code, Secure infrastructure configuration, and OSS/COTS validation?

Q:

Which phase of DevSecOps would contain the activities Detect & Visualize, Respond, and Recover?

Q:

The Deploy step in the DevSecOps Release, Deploy & Decommission phase contains which of these activities?

Q:

The Respond step in the DevSecOps Operate & Monitor phase contains which of these activities?

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments