Web application security - the fast guide 1.1 | Page 188
Chapter 9 - Secure Application Development
P a g e | 188
browser.
5. All the following is true concerning Securing web application
EXCEPT:
a. It is always better to create your own libraries than to depend on
well-known libraries because this will emphasize the security by
obscurity.
b. Using static analysis for compiled code can reveal vulnerabilities
that cannot be discovered through non compiled code analysis as it
might not exist there at all.
c. Black box testing depends on analyzing the HTTP response to
detect vulnerabilities in the application.
d. In contrast with passive scanning Active black box scanning embed
the creation and generation of own HTTP requests to extract
vulnerabilities
6. Response planning mainly aims to:
a. Minimize loss and Mitigate the weaknesses that were exploited.
b. Restore services and processes.
c. Reduce the risk that can occur from future incidents.
d. All the above
7. In Agile SDL:
a. Lots of tasks are omitted to adhere with agility needs
b. Some security practices tasks are repeated for each sprint.
c. There is no such thing as agile SDL
d. Threat modeling is not applicable.
8. The main difference between SDL and CLASP methodology:
a. CLASP add extra focus about the role responsible on applying each
practice activity
b. SDL is not a