Free CISSP Practice Exams: DOMAIN 8: Software Development Security + Anki Cards

Ref:📕The Official ISC2 CISSP CBK Reference 6th Edition

DOMAIN 8: Software Development Security

1 / 88

What is the purpose of input sanitization?

2 / 88

Which phase of the Software Development Lifecycle (SDLC) involves testing to ensure the system is fit for purpose and meets requirements?

3 / 88

Which of the following is true about guidelines and standards in software development security?

4 / 88

What is the primary benefit of implementing access controls in a code repository to protect confidentiality of source code?

5 / 88

Which type of application security testing tool evaluates non-running application elements like compiled binaries and is easily incorporated in an IDE and developer workflow, with automated testing performed when developers check code in and immediate feedback to developers in a format that is easy for them to understand?

6 / 88

Which of the following application security testing tools executes alongside the application as it is run?

7 / 88

What is the purpose of maturity models in software development and security?

8 / 88

What is the benefit of using SOAR in incident response?

9 / 88

What is the difference between auditing and logging?

10 / 88

What is the purpose of Continuous Integration (CI) in software development?

11 / 88

What are some proactive risk mitigations available in the software development domain?

12 / 88

What is the Software Assurance Maturity Model (SAMM)?

13 / 88

Which NIST Special Publication replaced the one that originally described security in the SDLC?

14 / 88

Which of the following is a type of security tool that can provide near-continuous feedback to improve the security of software during development?

15 / 88

What is a key principle of Agile development that supports the security goal of availability and also helps meet changing confidentiality and integrity needs?

16 / 88

What is the advantage of using SOAR over legacy methods for incident response?

17 / 88

What are some common components found in maturity models?

18 / 88

Which SDLC phase includes activities such as change management?

19 / 88

What is the main difference between compiled and interpreted languages?

20 / 88

Which of the following contains a technology-neutral OWASP Secure Coding Practices Quick Reference Guide?

21 / 88

What is a key activity to be audited during the design phase of the SDLC?

22 / 88

Which of the following is a challenge when securing software in a complex computing environment?

23 / 88

What is the importance of using validated libraries in an organization?

24 / 88

Which of the following is NOT a domain within the Cybersecurity Maturity Model Certification (CMMC)?

25 / 88

What was the initial purpose of the Capability Maturity Model?

26 / 88

Which of the following is a common configuration item (CI) in software configuration management (SCM)?

27 / 88

What are the main purposes of logs in software development security?

28 / 88

What is a significant challenge in assessing and controlling acquired software compared to custom-built software?

29 / 88

What should be considered when selecting an API security testing tool?

30 / 88

Which SDLC phase involves activities such as archiving or transitioning data to a replacement system?

31 / 88

What is the range of CVSS scores?

32 / 88

Which software development methodology is designed to be executed in a repetitive series and places a heavy focus on risk assessment, analysis, and evaluation?

33 / 88

Which of the following is an important practice for measuring software security effectiveness?

34 / 88

What is the primary difference between a weakness and a vulnerability in software?

35 / 88

What should be considered when performing a risk assessment for software development environments?

36 / 88

In which phase of the Software Development Lifecycle is the business need and case for a system expressed, requirements documented, and resources allocated?

37 / 88

What is the purpose of change management in software development security?

38 / 88

What is one-way certificate-based authentication?

39 / 88

What is the benefit of integrating testing activities closer to development activities in Agile methodologies?

40 / 88

Which of the following is NOT a security function that cryptography can provide when applied to APIs?

41 / 88

Which programming paradigm treats both data and functions as objects, known as classes, which can be linked together through defined interactions?

42 / 88

What factors guide an organizations choice of development methodology?

43 / 88

What is syntax in programming languages?

44 / 88

What is the benefit of an integrated development environment (IDE) for developers?

45 / 88

Which language may require access to privileged functions on user machines such as local file access, which is a major security concern since the code comes from an untrusted party across the internet?

46 / 88

Which of the following is true about the Building Security-In Maturity Model (BSIMM)?

47 / 88

What are characteristics that are similar across maturity models?

48 / 88

What is the Secure by design principle?

49 / 88

At what level of the Capability Maturity Model Integration (CMMI) do organizations focus on process improvement?

50 / 88

What is a disadvantage of dynamic application security testing (DAST)?

51 / 88

What are common components found in maturity models?

52 / 88

Which of the following is a common component of maturity models in the software development security domain?

53 / 88

What is one of the benefits of using standard web protocols in REST APIs?

54 / 88

What is the purpose of branching in code repositories?

55 / 88

What is a key resource provided by OWASP to assist with API security?

56 / 88

What is the importance of standardized secure coding practices in software and system development processes?

57 / 88

Which of the following is a factor for organizations to consume information systems as managed services?

58 / 88

What is the goal of Integrated Product Teams (IPTs) in software development security?

59 / 88

What is the ultimate goal of DevSecOps?

60 / 88

What is a trusted computing base (TCB)?

61 / 88

What is the purpose of a REST API?

62 / 88

What is code escrow?

63 / 88

Which advantage does Software-Defined Security not offer?

64 / 88

What is a key role of QA in a DevOps team?

65 / 88

What is the purpose of maturity models in software development security?

66 / 88

Which of the following vulnerabilities is related to handling of usersupplied XML and may cause the application to execute unwanted remote code or load malicious data from an external storage location?

67 / 88

What is an essential requirement for data ingestion and automation of responses in SOAR platforms?

68 / 88

Which frameworks provide assurance related to cloud services and applications?

69 / 88

In which cloud service model(s) is the consumer responsible for applying software patches to any software they deploy?

70 / 88

When selecting security controls for software development, what should be integrated into existing SDLC processes for the systems they are designed to protect?

71 / 88

Which application security testing approach combines elements of SAST, DAST, and penetration testing, often using complex algorithms and machine learning to analyze source code and correlate vulnerabilities discovered during dynamic testing?

72 / 88

Which of the following is best described as a community-developed list of software and hardware weakness types that is integrated with security products such as scanning tools as a common way of identifying and reporting on potential weaknesses in information systems?

73 / 88

What is the importance of integrating security activities throughout each phase of the software development lifecycle (SDLC)?

74 / 88

Which standard replaced NIST SP 800-64 to align security considerations with the SLC processes identified in ISO 15288?

75 / 88

Which of the following tasks is the responsibility of a security practitioner during operation and maintenance?

76 / 88

What is a disadvantage of the Waterfall methodology?

77 / 88

What is an important consideration that must be taken when designing APIs?

78 / 88

What is the Attack Surface factor that provides an explanation of the factors needed to exploit a weakness in software development security based on the Common Weakness Scoring System (CWSS)?

79 / 88

Which stage of software development introduces risks such as new attack vectors or regulatory compliance burdens?

80 / 88

Which of the following is a tool designed to review the underlying code of a program without actually running the program itself, and identify problems like improper coding that could lead to buffer overflow conditions?

81 / 88

Which of the following is a common component of maturity models?

82 / 88

Which type of application security testing tool is not tightly integrated with an IDE and provides easy access to non-developers but can cause performance issues in a production environment?

83 / 88

What security measures should be in place to protect a software repositorys communication and network access?

84 / 88

What is the purpose of Common Vulnerabilities and Exposures (CVE) ID?

85 / 88

Which of the following is a key concern when evaluating Open Source Software (OSS)?

86 / 88

What is one of the advantages of automated testing over manual testing in a CI/CD pipeline?

87 / 88

What is the difference between strong and weakly typed programming languages?

88 / 88

What is the most immediate security drawback of COTS software?

Your score is

Share the Post:

Download Your FREE CISSP Anki Deck!

Email issues? [ [email protected] ]

Share the Post:

CISSP Domain 8: Mastering Software Development Security

Are you ready to tackle CISSP Domain 8?
This domain emphasizes the importance of secure software development practices in information security.

 

Key topics covered in Domain 8:

    • 1.Secure Software Development Life Cycle (SDLC)
    • 2.Secure Coding Practices
    • 3.Application Security Controls
    • 4.Software Vulnerability Testing

 

Mastering Domain 8 for CISSP Success

This knowledge is crucial not only for passing the CISSP exam but also for your career in cybersecurity. You’ll learn how to integrate security throughout the development process, avoid common vulnerabilities, and implement effective security measures.

 

Utilize Free CISSP Practice Tests

Utilize our free CISSP practice tests to assess your knowledge. These tests, complete with detailed explanations, will help you prepare thoroughly for the exam.

 

Beyond the Exam: Developing Essential Skills

Mastering Domain 8 goes beyond passing the exam. It’s an opportunity to develop skills in creating secure and reliable software, positioning you as a true information security professional. For official information, visit the ISC² CISSP page.

We wish you success on your CISSP journey.
Use this guide and the practice tests to approach Domain 8 with confidence!

 

Related Posts

RSS  
  • WGU Master’s Degree Rankings 2026 | I Asked 3 AIs 300 Times to Find the Best One
    Table of Contents Which WGU Master’s Degree Is Actually Worth It? If you’re considering a master’s degree from WGU and can’t figure out which program to choose — cybersecurity, software engineering, AI/ML, data analytics — you’re not alone. The options are overwhelming, and most comparisons online are either outdated or purely opinion-based. So here’s a […]
  • How I Made $1.3 Million in Cybersecurity (With Exact Revenue Numbers)
    Table of Contents If you’re stuck at $50K–$100K and wondering, “How the hell do people make seven figures?” this is for you.I’m Josh Madakor. In 2025, I made $1.3 million in cybersecurity. Not from a corporate job. Not from VC funding. And definitely not from selling a bullshit course.In this article, I’ll break down everything: […]
  • The Best Laptops for Cyber Security in 2026: Stop Over-Analyzing, Start Building
    Table of Contents Let’s be real: most people think that to get into cyber security, you need to be a “super elite hacker” running 10 different virtual machines on a glowing, heavy-duty gaming laptop. Spoiler alert: That’s just not how the industry works. I’ve spent years in roles ranging from Senior Analyst to Security Engineer, […]