DOMAIN 8: Software Development Security

1 / 88

What is the difference between auditing and logging?

2 / 88

What is the ultimate goal of DevSecOps?

3 / 88

Which of the following is NOT a security function that cryptography can provide when applied to APIs?

4 / 88

What is the most immediate security drawback of COTS software?

5 / 88

What is one-way certificate-based authentication?

6 / 88

Which of the following is a tool designed to review the underlying code of a program without actually running the program itself, and identify problems like improper coding that could lead to buffer overflow conditions?

7 / 88

What should be considered when performing a risk assessment for software development environments?

8 / 88

What is one of the advantages of automated testing over manual testing in a CI/CD pipeline?

9 / 88

Which of the following is an important practice for measuring software security effectiveness?

10 / 88

Which of the following is best described as a community-developed list of software and hardware weakness types that is integrated with security products such as scanning tools as a common way of identifying and reporting on potential weaknesses in information systems?

11 / 88

Which SDLC phase includes activities such as change management?

12 / 88

Which of the following is a challenge when securing software in a complex computing environment?

13 / 88

What is the purpose of maturity models in software development and security?

14 / 88

Which of the following is a common component of maturity models in the software development security domain?

15 / 88

What is the purpose of Continuous Integration (CI) in software development?

16 / 88

What is the importance of using validated libraries in an organization?

17 / 88

What is a key principle of Agile development that supports the security goal of availability and also helps meet changing confidentiality and integrity needs?

18 / 88

What are some proactive risk mitigations available in the software development domain?

19 / 88

What factors guide an organizations choice of development methodology?

20 / 88

What are common components found in maturity models?

21 / 88

What is the primary difference between a weakness and a vulnerability in software?

22 / 88

What is the advantage of using SOAR over legacy methods for incident response?

23 / 88

Which NIST Special Publication replaced the one that originally described security in the SDLC?

24 / 88

What is a trusted computing base (TCB)?

25 / 88

What is the Attack Surface factor that provides an explanation of the factors needed to exploit a weakness in software development security based on the Common Weakness Scoring System (CWSS)?

26 / 88

What is the purpose of a REST API?

27 / 88

What is a disadvantage of the Waterfall methodology?

28 / 88

What is the Secure by design principle?

29 / 88

Which software development methodology is designed to be executed in a repetitive series and places a heavy focus on risk assessment, analysis, and evaluation?

30 / 88

Which of the following is NOT a domain within the Cybersecurity Maturity Model Certification (CMMC)?

31 / 88

Which language may require access to privileged functions on user machines such as local file access, which is a major security concern since the code comes from an untrusted party across the internet?

32 / 88

What is the difference between strong and weakly typed programming languages?

33 / 88

Which of the following is a factor for organizations to consume information systems as managed services?

34 / 88

What is the purpose of input sanitization?

35 / 88

What is a significant challenge in assessing and controlling acquired software compared to custom-built software?

36 / 88

What is a key activity to be audited during the design phase of the SDLC?

37 / 88

Which programming paradigm treats both data and functions as objects, known as classes, which can be linked together through defined interactions?

38 / 88

What is the primary benefit of implementing access controls in a code repository to protect confidentiality of source code?

39 / 88

What is the main difference between compiled and interpreted languages?

40 / 88

What is the purpose of branching in code repositories?

41 / 88

What is the goal of Integrated Product Teams (IPTs) in software development security?

42 / 88

What is the importance of integrating security activities throughout each phase of the software development lifecycle (SDLC)?

43 / 88

What is a key resource provided by OWASP to assist with API security?

44 / 88

Which of the following is a key concern when evaluating Open Source Software (OSS)?

45 / 88

At what level of the Capability Maturity Model Integration (CMMI) do organizations focus on process improvement?

46 / 88

What is one of the benefits of using standard web protocols in REST APIs?

47 / 88

What is a disadvantage of dynamic application security testing (DAST)?

48 / 88

Which of the following is a common component of maturity models?

49 / 88

Which phase of the Software Development Lifecycle (SDLC) involves testing to ensure the system is fit for purpose and meets requirements?

50 / 88

Which application security testing approach combines elements of SAST, DAST, and penetration testing, often using complex algorithms and machine learning to analyze source code and correlate vulnerabilities discovered during dynamic testing?

51 / 88

What is the purpose of change management in software development security?

52 / 88

What is the benefit of integrating testing activities closer to development activities in Agile methodologies?

53 / 88

What is a key role of QA in a DevOps team?

54 / 88

What should be considered when selecting an API security testing tool?

55 / 88

Which of the following vulnerabilities is related to handling of usersupplied XML and may cause the application to execute unwanted remote code or load malicious data from an external storage location?

56 / 88

Which advantage does Software-Defined Security not offer?

57 / 88

What is the importance of standardized secure coding practices in software and system development processes?

58 / 88

In which phase of the Software Development Lifecycle is the business need and case for a system expressed, requirements documented, and resources allocated?

59 / 88

What is the benefit of an integrated development environment (IDE) for developers?

60 / 88

What is the purpose of maturity models in software development security?

61 / 88

What is the benefit of using SOAR in incident response?

62 / 88

Which type of application security testing tool evaluates non-running application elements like compiled binaries and is easily incorporated in an IDE and developer workflow, with automated testing performed when developers check code in and immediate feedback to developers in a format that is easy for them to understand?

63 / 88

What is an important consideration that must be taken when designing APIs?

64 / 88

What are characteristics that are similar across maturity models?

65 / 88

Which frameworks provide assurance related to cloud services and applications?

66 / 88

What is code escrow?

67 / 88

Which stage of software development introduces risks such as new attack vectors or regulatory compliance burdens?

68 / 88

Which SDLC phase involves activities such as archiving or transitioning data to a replacement system?

69 / 88

What is the range of CVSS scores?

70 / 88

Which of the following is a type of security tool that can provide near-continuous feedback to improve the security of software during development?

71 / 88

What is an essential requirement for data ingestion and automation of responses in SOAR platforms?

72 / 88

In which cloud service model(s) is the consumer responsible for applying software patches to any software they deploy?

73 / 88

Which of the following is a common configuration item (CI) in software configuration management (SCM)?

74 / 88

What was the initial purpose of the Capability Maturity Model?

75 / 88

What is the Software Assurance Maturity Model (SAMM)?

76 / 88

What security measures should be in place to protect a software repositorys communication and network access?

77 / 88

Which of the following contains a technology-neutral OWASP Secure Coding Practices Quick Reference Guide?

78 / 88

Which of the following tasks is the responsibility of a security practitioner during operation and maintenance?

79 / 88

When selecting security controls for software development, what should be integrated into existing SDLC processes for the systems they are designed to protect?

80 / 88

Which type of application security testing tool is not tightly integrated with an IDE and provides easy access to non-developers but can cause performance issues in a production environment?

81 / 88

What are the main purposes of logs in software development security?

82 / 88

Which standard replaced NIST SP 800-64 to align security considerations with the SLC processes identified in ISO 15288?

83 / 88

Which of the following is true about guidelines and standards in software development security?

84 / 88

What is syntax in programming languages?

85 / 88

What is the purpose of Common Vulnerabilities and Exposures (CVE) ID?

86 / 88

Which of the following application security testing tools executes alongside the application as it is run?

87 / 88

What are some common components found in maturity models?

88 / 88

Which of the following is true about the Building Security-In Maturity Model (BSIMM)?

Your score is

🔒 Hands-On Cybersecurity Course + INTERNSHIP 🔒

Visit to Cyber Course  

 

CISSP Domain 8: Mastering Software Development Security

Are you ready to tackle CISSP Domain 8?
This domain emphasizes the importance of secure software development practices in information security.

 

Key topics covered in Domain 8:

    • 1.Secure Software Development Life Cycle (SDLC)
    • 2.Secure Coding Practices
    • 3.Application Security Controls
    • 4.Software Vulnerability Testing

 

Mastering Domain 8 for CISSP Success

This knowledge is crucial not only for passing the CISSP exam but also for your career in cybersecurity. You’ll learn how to integrate security throughout the development process, avoid common vulnerabilities, and implement effective security measures.

 

Utilize Free CISSP Practice Tests

Utilize our free CISSP practice tests to assess your knowledge. These tests, complete with detailed explanations, will help you prepare thoroughly for the exam.

 

Beyond the Exam: Developing Essential Skills

Mastering Domain 8 goes beyond passing the exam. It’s an opportunity to develop skills in creating secure and reliable software, positioning you as a true information security professional. For official information, visit the ISC² CISSP page.

We wish you success on your CISSP journey.
Use this guide and the practice tests to approach Domain 8 with confidence!

 

Fill up to receive the FREE CISSP deck!

* indicates required
Share the Post: