Home
26.
The primary reason for designing Single Sign On (SSO) capabilities is to
  • A.
    increase the security of authentication mechanisms.
  • B.
    simplify user authentication.
  • C.
    have the ability to check each access request.
  • D.
    allow for interoperability between wireless and wired networks.
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
The design principle of economy of mechanism states that one must keep the design as simple and small as possible. This well known principle deserves emphasis for protection mechanisms because design and implementation errors that result in unwanted access paths will not be noticed during normaluse. As a result, techniques such as line-by-line inspection of software that implements protection mechanisms are necessary. For such techniques to be successful, a small and simple design is essential. SSO support this principle by simplifying the authentication process.
Report
Name Email  
27.
Database triggers are PRIMARILY useful for providing which of the following detective software assurance capability?
  • A.
    Availability.
  • B.
    Authorization.
  • C.
    Auditing.
  • D.
    Archiving.
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
All stored procedures could be updated to incorporate auditing logic; however a better solution is to use database triggers. You can use triggers to monitor actions performed on the database tables and automatically log auditing information.
Report
Name Email  
28.
During a threat modeling exercise, the software architecture is reviewed to identify
  • A.
    attackers.
  • B.
    business impact.
  • C.
    critical assets.
  • D.
    entry points.
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
During threat modeling, the application is dissected into its functional components. The development team analyzes the components at every entry point and traces data flow through all functionality to identify security weaknesses.
Report
Name Email  
29.
A Man-in-the-Middle (MITM) attack is PRIMARILY an expression of which type of the following threats?
  • A.
    Spoofing
  • B.
    Tampering
  • C.
    Repudiation
  • D.
    Information disclosure
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Although it may seem that a MITM attack is an expression of the threat of repudiation, and it very well could be, it is PRIMARILY a spoofing threat. In a spoofing attack, an attacker impersonates a different person and pretends to be a legitimate user of the system. Spoofing attack is mitigated through authentication so that adversaries cannot become any other user or assume the attributes of another user.
When undertaking a threat modeling exercise, it is important to list all possible threats, regardless of whether they have been mitigated so that you can later generate test cases where necessary. If the threat is not documented, there is a high likelihood that the software will not be tested for those threats.
Using a categorized list of threats (such as STRIDE which is an acronym of Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service and Elevation of Privilege) is useful to list all possible threats.
Report
Name Email  
30.
IPSec technology which helps in the secure transmission of information operates in which layer of the Open Systems Interconnect (OSI) model?
  • A.
    Transport.
  • B.
    Network.
  • C.
    Session.
  • D.
    Application.
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Although software security has specific implications on layer 7, the application of the OSI stack, the security at other levels of the OSI stack is also important and should be leveraged to provide defense in depth. The seven layers of the OSI stack are Physical (layer 1), Data Link (layer 2), Network (layer 3), Transport (layer 4), Session (layer 5), Presentation (layer 6) and Application (layer 7). SSL and IPSec can be used to assure confidentiality for data in motion. SSL operates at the Transport Layer (layer 4) and IPSec operates at the Network Layer (layer 3) of the OSI model.
Report
Name Email