Organizations that do not prioritize security during software development are almost
assured to have an:
a secure application.
b insecure application.
c secure network.
d insecure network
Which of the following statements is true regarding managing web application
security?
a In some respects, it is more difficult than other traditional network areas.
b It is easier than other traditional network areas.
c It is easier to achieve if the focus is put on security after software development.
d It is not necessary to manage web application security.
The maintains a list of the top web application vulnerabilities.
a Federal Bureau of Investigation FBI
b International Security Team IST
c Web Application Vulnerabilities Project WAVP
d Open Web Application Security Project OWASP
Understanding the most common vulnerabilities can enable administrators to select
appropriate to prevent or counteract attacks.
a firewalls
b antivirus programs
c best practices
d personnel
Which of the following can include establishing and following strong network security
procedures, deploying encryption strategies, configuring preventative mitigation tools,
and educating employees?
a Best practices
b Planning
c Development
d Assessment