Your organization’s top management requires data classified at a higher security level shall not flow to a subject with a lower level clearance, and classified data shall not be sent to anyone who doesn’t need to know in terms of their duty. Which of the following should be considered first to meet the policy requirements? (Wentz QOTD) A. A management system aligned with the policy B. A system based on state machine and information flow C. An information system that supports the access control matrix D. A lattice-based model that enforces mandatory access control
Your company implements a website and sells products online. A frequent customer is logging into the system. Which of the following authentication schemes is least likely to be implemented to validate the username and password against the directory that encrypts and stores all customer’s passwords? (Wentz QOTD) A. Claim-based B. Cleartext-based C. Ciphertext-based D. Checksum-based
Which of the following governance-level committees least commonly belongs to the board of directors? (Wentz QOTD) A. Audit Committee B. Business Continuity Committee C. Remuneration Committee D. Nomination Committee
It’s common for people to be confused by data abstraction and encapsulation and treat the concept of abstraction as encapsulation or information hiding. That’s not the case. The following definitions come from ISO/IEC/IEEE 24765:2017 Systems and software engineering — Vocabulary.
process of extracting the essential characteristics of data by defining data types and their associated functional characteristics and disregarding representation details
result of the process in (1)
software development technique that consists of isolating a system function or a set of data and operations on those data within a module and providing precise specifications for the module
concept that access to the names, meanings, and values of the responsibilities of a class is entirely separated from access to their realization [IEEE 1320.2-1998 (R2004) IEEE Standard for Conceptual Modeling Language Syntax and Semantics for IDEF1X97 (IDEFobject), 3.1.54]
the idea that a module has an outside that is distinct from its inside, that it has an external interface and an internal implementation
software development technique in which each module’s interfaces reveal as little as possible about the module’s inner workings and other modules are prevented from using information about the module that is not in the module’s interface specification
containment of a design or implementation decision in a single module so that the decision is hidden from other modules
I build a multi-target .NET project, DomainModel, that supports .NET framework and .NET Core and publish the Windows Form Application as the client using Microsoft ClickOnce requiring the shared DomainModel be strongly-named. However, it doesn’t make sense on a docker node in Azure.
As a development organization, your company initiated a security champion program based on the Software Assurance Maturity Model (SAMM)to increase the effectiveness and efficiency of application security and compliance and to strengthen the relationship between various teams and Information Security. Which of the following is the best arrange for the security champion? (Wentz QOTD) A. Establish a security champion position reporting to CEO directly B. Establish a security champion position reporting to CISO directly C. Assign a developer in each project to serve as the security champion role D. Assign a functional manager with position power to serve as the security champion role
As a security professional, you are concerned with acquired products or services going end-of-life or end-of-service. Which of the following is the most crucial reason? (Wentz QOTD) A. Risk exposure increases. B. Maintenance costs get higher. C. System availability can be impacted. D. Vulnerabilities remain open and unpatched.