Loading...
Scoreboard
Exam statistics
Login
≡
Browse
✎
Study
Courses
Add
Edit
IMT4123
DCSG2003
IDATG2202
IDATG2204
IDG1362
IIKG1001
IIKG2001
IIKG3005
PROG1003
PROG1004
PROG2005
PROG2006
PROG2007
Q
Tooltips
Eksamen 2022 1 / 102
Who developed the SAMM software assurance methodology?
0
Add comment
Comment
▲
Reveal
back
skip
next
Questions
Who developed the SAMM so...
1
What is non-repudiation a...
2
What is residual risk abo...
3
Security bugs can be very...
4
There are five categories...
5
The following refer to th...
6
Requiring the end user to...
7
The weakest algorithm amo...
8
What is the difference be...
9
Which of the following is...
10
Audit logs can be used fo...
11
Implementing CAPTCHA (Com...
12
Parity bit checking mecha...
13
What is non-repudiation a...
14
Which of the following is...
15
When a customer attempts ...
16
When software is able to ...
17
There are several code au...
18
A race condition is defin...
19
Which of the following is...
20
Cryptographic agility mea...
21
In GDPR, the Right to be ...
22
The process of eliciting ...
23
The following Design Prin...
24
Which of the following is...
25
During which phase of the...
26
The process of removing p...
27
The FIRST step in the Pro...
28
The resiliency of softwar...
29
When distributing signed ...
30
Which of the following is...
31
Certificate Authority, Re...
32
The use of digital signat...
33
The amount of time by whi...
34
The primary reason for de...
35
Which of the following is...
36
The organization that pub...
37
Countermeasures and safeg...
38
During a threat modeling ...
39
Checksum validation can b...
40
Infinite loops and improp...
41
A man-in-the-middle attac...
42
John is part of the "auth...
43
Data classification is a ...
44
Common Criteria, as well ...
45
Verbose error messages an...
46
User education is the bes...
47
In symmetric key cryptogr...
48
Which of the following tr...
49
The findings of a code re...
50
Requirements that are ide...
51
______ express the concep...
52
Programming in the style ...
53
The token that is PRIMARI...
54
When software is purchase...
55
The current, internationa...
56
Which of the following is...
57
Three common assumptions ...
58
Good modular programming ...
59
Extended Validation Certi...
60
User education is the bes...
61
The WEAKEST algorithm amo...
62
When distributing signed ...
63
Mechanisms/principles tha...
64
The process of removing p...
65
Using multifactor authent...
66
The benefits of designing...
67
A race condition is defin...
68
Cryptographic agility mea...
69
The FIRST step in the Pro...
70
When software is able to ...
71
In public key cryptograph...
72
The PRIMARILY element use...
73
In GDPR the concept of Pr...
74
Which of the following is...
75
Which of the following ar...
76
Audit logs can be used fo...
77
Which of the following is...
78
Implementing CAPTCHA (Com...
79
The process of eliciting ...
80
John is part of the "auth...
81
In GDPR, the Right to be ...
82
During which phase of the...
83
What does a DPO do?
84
Which of the following pr...
85
Verbose error messages an...
86
Which of the following ty...
87
Three aspects need to coe...
88
What kind of activities a...
89
There are several code au...
90
The major benefits of sym...
91
Which of the following is...
92
In symmetric key cryptogr...
93
The following are differe...
94
Parity bit checking mecha...
95
Code signing can provide ...
96
Which of the following tr...
97
The property of software ...
98
When software is purchase...
99
Which of the following is...
100
Code signing can provide ...
101
Regarding the place where...
102