Copyright

Cybercrime & Software Development Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Penetration testing differs from Security Auditing in that _____

Question 2 2. Which of the following statement is FALSE with regards to the importance of Software Security Testing?

Question 3 3. Which of the following is NOT a software security test?

Question 4 4. What is Software Security Testing?

Question 5 5. Which of the following software development processes is best for large and complicated projects?

Page 2

Question 6 6. The _____ development process demonstrates the relationship between each early phase of development and the associated testing phase.

Question 7 7. Which of the following is NOT a use for prototyping?

Question 8 8. Which of the following software development processes follows a linear sequence from initiation and conception to maintenance?

Question 9 9. A Software is secure when _____.

Question 10 10. Securing software is important because _____.

Page 3

Question 11 11. Which of the following records the time stamps of activities of the software?

Question 12 12. Software Auditing ensures _____.

Question 13 13. What is an operating system?

Question 14 14. The physical components of a computer are the _____; the digital programs running on the hardware are the _____.

Question 15 15. Computer software is _____.

Page 4

Question 16 16. BIOS is an example of _____.

Question 17 17. What type of testing is performed immediately before deployment?

Question 18 18. Who normally performs Business Level Testing?

Question 19 19. What is a failed test?

Question 20 20. What type of testing checks that all modules can communicate with each other?

Page 5

Question 21 21. When working to find secure programming methodologies, programmers should:

Question 22 22. In programming, the requirements phase is:

Question 23 23. The TJ Maxx hack was due to:

Question 24 24. Agile development:

Question 25 25. Which of the following statements is TRUE?

Page 6

Question 26 26. Which of the following does NOT enhance the security environment in software development?

Question 27 27. At which stage is Static Code Analysis important?

Question 28 28. The earliest stage at which security should be factored into the development of safe software is the _____ stage.

Question 29 29. Vulnerability Scanning involves _____.

Question 30 30. Which software development approach prebuilds components to quickly facilitate design?

Cybercrime & Software Development Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 110: Introduction to Cybersecurity  /  Computer Science Courses
Support