Which software control test examines the internal logical structures of a program and steps through the code line by line to analyze the program for potential errors?
In which step of the PASTA threat modeling methodology will the team capture infrastructure, application, and software dependencies?
A recent security review has identified an aging credential recovery/forgotten password component that emails temporary passwords to users who claim to have forgotten their application password.
How should the organization remediate this vulnerability?
Which security assessment deliverable identities possible security vulnerabilities in the product?
Which privacy impact statement requirement type defines processes to keep personal information updated and accurate?
While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.
How should existing security controls be adjusted to prevent this in the future?
During fuzz testing of the new product, random values were entered into input elements Search requests were sent to the correct API endpoint but many of them failed on execution due to type mismatches.
How should existing security controls be adjusted to prevent this in the future?
Which design and development deliverable contains the types of evaluations that were performed, how many times they were performed, and how many times they were re-evaluated?
Which type of security analysis is performed using automated software tools while an application is running and is most commonly executed during the testing phase of the SDLC?