SSE Fundamentals
SSE Processes
Integrate with SDLC
Technical Management
Technology Procurement
100

Balancing the investment in security controls commensurate with the associated risk

Adequate Security

100

During which SDLC phase should security be integrated?

Each phase

100

What is the most important factor to consider when selecting an SDLC model?

Organizational needs

100

Which technical management process is most helpful in making a choice when many options are available?

Decision Management

100

Which contract type presents the least risk due to underestimation of installation and configurations costs?

Fixed Price

200

An attack vector where an aggressor intercepts communications, examining the message 

Confidentiality

200

What is the best approach for identifying organizational security authorities?

Identification and integration of both internal and external security authorities.

200

What is the purpose of assurance methods in SSE?

Providing confidence that security requirements are being met.

200

What is not an intended outcome of the quality assurance process?

Completely free of flaws

200

As an ISSE how should you contribute to the acquisition process?

Providing cybersecurity input

300

Examining legacy code and removing code that is no longer applicable

Reduced complexity

300

What is the best approach to ensure an effective system security governance framework?

Adopting a governance framework which integrates the appropriate standards with organizational policy.

300

What is the role of models in SSE?

Structured approach 

300

Which technical management process confirms alignment?

Project Assessment and Control

300

SSE contributes to the overall design by achieving what outcome?

Adequate security

400

The role primarily responsible for helping the organization understand the needs to design a secure trustworthy system

System Engineer

400

What is utilizing a well-known interface in SDLC?

Open Design

400

Integrating security considerations early and continuously throughout SDLC is what approach?

DevSecOps

400

Which technical management process involves asset identification, threat enumeration, vulnerability assessment, likelihood and impact

Risk Management

400

What design concept best protects company developed data analysis algorithms?

Proprietary

500

The document that captures how information flows, is used, and is protected by the system

Information Management Model

500

Restricting access to application source code is what type of software design?

Proprietary Design

500

Which SDLC methodology is characterized by iterative development cycles that are fielded rapidly?

Agile

500

Which technical management process ensures compliance with defined requirements?

Quality Assurance

500

Which agreement process is responsible for identifying system security requirements?

Acquisition