Appendix A. Answers to Assessment Questions
The level of confidence that software functions as intended and is free of vulnerabilities, either intentionally or unintentionally designed or inserted as part of the software, is the definition of:
Software risk
Software impact
Software assurance
Software accountability
Answer: C
Option C is the definition of assurance from the U.S. Department of Defense (DoD) Software Assurance Initiative. Options A, B, and D are made-up distracters.
Seven complementary elements that support information assurance are confidentiality, integrity, availability, authentication, authorization, accountability, and:
Repudiation
Auditing
Operations
Acquisition
Answer: B
Options A, C, and D are not directly involved with the support of assurance.
A form of confidentiality breach that is accomplished by studying the volume, rate, source, and destination of transmitted messages is:
Inference analysis
Covert channel analysis
Messaging analysis
Traffic analysis
Answer: D
Option D is correct by the definition of traffic analysis. Options A and C are made-up distracters, and option B refers to hidden data transfer paths.
An unauthorized and unintended communication path that provides for exchange of information is a:
Secret link
Covert channel
Covert encryption
Communication pipe
Answer: B
The correct option is B.
The ability of an entity to use and correlate information protected at one level of security to uncover information that is protected at a higher security level is called: ...
Get The CSSLP™ Prep Guide: Mastering the Certified Secure Software Lifecycle Professional now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.