Questions
- Several software developers are invited to review each other's source code. This is an example of which type of activity?
A. Passive testing
B. Fuzzing
C. Static analysis
D. Dynamic analysis
- Mal, a system administrator, insists that she did not send an email threatening a co-worker. Further analysis shows that the public key of the letter directly relates to Mal's private key. What is this an example of?
A. Certificates
B. Non-repudiation
C. Defense in depth
D. Repudiation
- The security approach of complete mediation has which of the following features?
A. A security design that preserves data integrity
B. A security design where all access is verified
C. A security design where a kernel protects the hardware
D. A security design that uses defense in depth
- Which organization is responsible for maintaining the top 10 list of web application vulnerabilities?
A. OSSTMM
B. OWASP
C. OEC
D. OCTAVE
- The software development team at Flat Ground Mountain Bank is planning...