Looking for CMP5358 Software Security A S1 2025/6 test answers and solutions? Browse our comprehensive collection of verified answers for CMP5358 Software Security A S1 2025/6 at moodle.bcu.ac.uk.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
Answer the following:
An organisation wants to reduce the risk of permission-related vulnerabilities in its applications and systems. Which strategies directly help prevent permission misuse or over-privilege? Select 2 correct answers.
Explain the difference between qualitative and quantitative risk assessment methods. Which method do you prefer, and under what conditions would you choose it over the other? Support your answer with at least one example scenario.
Justify your answer to the previous Heartbleed question. In your explanation, discuss the technical vulnerability exploited in Heartbleed.
A financial services company discovers that some of its legacy servers are still running a vulnerable version of OpenSSL affected by the Heartbleed bug. These servers handle encrypted client authentication sessions and internal API communications. Which statement most accurately describes the technical mechanism and realistic impact of the Heartbleed vulnerability?
Justify your answer to question 2. Explain why your selected option represents responsible vulnerability disclosure and why the other alternatives do not appropriately manage ethical, legal, and security risks.
During the vulnerability life cycle, at which stage should you contact the software or hardware vendor about a discovered vulnerability?
Which actions help mitigate mobile permission vulnerabilities? Select 2 correct answers.
A social media photo-editing mobile app requests multiple permissions during installation. The app claims these are needed for photo sharing, tagging, and “smart enhancements”. If the app becomes malicious or is compromised, which permission introduces the most dangerous and realistic security attack surface?
A security analyst uncovers a privilege escalation vulnerability in a widely used project management web platform that allows standard users to gain administrator permissions. The vendor has no formal vulnerability disclosure policy and historically delays responses to similar issues. Which action best reflects responsible vulnerability disclosure in this scenario?