KEO1 Free Sample Questions

Secure Software Design Practice Test
9/289 questions · Unlock full access
Q1

A security architect is reviewing a new e-commerce feature that allows users to upload a profile picture. The architect is concerned about a specific risk where a user could upload a malicious file disguised as an image, which is then served to other users and potentially executed by their browsers. Which STRIDE category best classifies this specific threat?

Q2

A QA team is preparing to test a new financial reporting application. The team has been given full access to the source code, detailed design documents, and architecture diagrams. They are tasked with creating test cases that validate specific logical paths and error-handling routines within the code. Which testing approach is being employed?

Q3

A Security Champion is training a new team of developers on secure coding practices. The champion emphasizes that when designing a system, it's crucial to ensure that a user cannot deny having performed an action. Which security principle is this related to, and which STRIDE category represents its failure?

Q4Multiple answers

A development team is building a healthcare application that must comply with HIPAA. The project manager is deciding between a Waterfall and an Agile methodology. Which of the following are compelling security-related reasons to choose a Waterfall model for this specific project? (Select TWO)

Q5

True or False: In the context of the Building Security In Maturity Model (BSIMM), an organization's maturity score is calculated by comparing its observed security activities against a predefined, static set of ideal best practices.

Q6

A new social media platform is undergoing a security review before launch. The security team decides to use the DREAD model to prioritize identified threats. A potential vulnerability is rated as follows: - Damage: 9 (Full system compromise) - Reproducibility: 10 (Always reproducible) - Exploitability: 8 (Requires an authenticated, but standard, user) - Affected Users: 10 (All users) - Discoverability: 5 (Difficult to find) What is the overall DREAD risk score for this vulnerability?

Q7

During a dynamic analysis of a web application, a security tester observes that appending `?debug=true` to a URL exposes detailed stack traces and database error messages. While this doesn't grant unauthorized access directly, it reveals the internal structure of the application and specific technologies used. Which STRIDE category is most appropriate for this finding?

Q8

**Case Study** A mid-sized insurance company, InsureRight, is developing a new customer claims portal. The portal will handle sensitive customer data, including personal identifiable information (PII) and protected health information (PHI). The development team follows an Agile methodology with two-week sprints. The company has a mature security program but is struggling to integrate it effectively into the fast-paced Agile workflow. The Chief Information Security Officer (CISO) is concerned that security is being treated as an afterthought, with security testing only happening in a final 'hardening' sprint before release. **Current Situation:** The development team consists of 15 developers, 4 QA testers, and 2 product owners. They do not have a dedicated application security engineer. Security knowledge is inconsistent across the team. The current process involves developers completing user stories, which are then passed to QA. The security team performs a penetration test two weeks before the scheduled release, often finding critical issues that cause significant delays. **Requirements:** The CISO wants to implement a 'shift-left' security strategy without disrupting the Agile process. The solution must be scalable and foster a culture of security ownership within the development team. The goal is to identify and remediate vulnerabilities as early as possible in the development lifecycle. Which of the following strategies would be the MOST effective first step for InsureRight to integrate security into their Agile process?

Q9

A project requires a detailed analysis of potential privacy risks associated with handling customer PII before development begins. This analysis will document how data is collected, used, and stored, and will assess compliance with regulations like GDPR. What is this formal process called?