Click on to view the answer

Which of the following is an example of a non-technical control?

Answer :
  • Security policies

Explanation :

Non-technical controls are security measures that are implemented through administrative or procedural means, such as security policies, security awareness training, and background checks.

Which of the following is an example of informed consent?

Answer :
  • A user is provided with clear and concise information about a data processing activity and gives their consent

Explanation :

Informed consent requires that users are provided with clear and concise information about a data processing activity and understand its purpose before giving their consent.

Which of the following is NOT a type of access control?

Answer :
  • Physical access control

Explanation :

Physical access control is not a type of access control. It refers to the measures taken to physically secure a facility, such as locks, alarms, and security guards.

Which of the following is a key component of the Microsoft SDL?

Answer :
  • Security training for developers

Explanation :

Security training for developers is a key component of the Microsoft SDL and helps ensure that developers have the knowledge and skills to develop secure software.

Which of the following is a potential consequence of not obtaining user consent?

Answer :
  • Legal and regulatory penalties

Explanation :

Not obtaining user consent can result in legal and regulatory penalties, such as fines or lawsuits. It is important to obtain consent to avoid these consequences.

Which of the following is an example of implied consent?

Answer :
  • A user clicks "I agree " on a terms and conditions page

Explanation :

Implied consent can be obtained through actions or behavior that suggest the user has given consent, such as clicking "I agree " on a terms and conditions page.

Which of the following is a key benefit of using threat modeling in the Microsoft SDL?

Answer :
  • It helps identify potential security vulnerabilities early in the development process

Explanation :

Threat modeling is a key component of the Microsoft SDL and helps identify potential security vulnerabilities early in the development process.

Which of the following is a key principle of the Microsoft SDL?

Answer :
  • Security should be integrated into every phase of the software development lifecycle

Explanation :

The Microsoft SDL is based on the principle that security should be integrated into every phase of the software development lifecycle.

Which of the following is NOT a phase of the Microsoft Secure Development Lifecycle (SDL)?

Answer :
  • Maintenance

Explanation :

The Microsoft SDL consists of seven phases: Requirements, Design, Implementation, Verification, Release, Response, and Retirement.

Which of the following is an example of an integrity breach?

Answer :
  • A user modifies data in a database without proper authorization

Explanation :

An integrity breach occurs when data is modified or deleted without proper authorization.