logo

Crowdly

Browser

Add to Chrome

CMP5358 Software Security A S1 2025/6

Looking for CMP5358 Software Security A S1 2025/6 test answers and solutions? Browse our comprehensive collection of verified answers for CMP5358 Software Security A S1 2025/6 at moodle.bcu.ac.uk.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Answer the following: 

  1. Have you read the assessment specification in full?
  2. Do you know the required tools for Case 1?
  3. Do you know the necessary tools for Case 3?
  4. Do you see the submission deadline and time?
  5. Do you know where and how to submit your work?
  6. Do you know the expected structure of your report?
  7. Do you know the penalties for late submission?
  8. Do you have any questions about the assessment requirements?
  9. Do you know about the support sessions (online and on campus)
View this question

An organisation wants to reduce the risk of permission-related vulnerabilities in its applications and systems. Which strategies directly help prevent permission misuse or over-privilege? Select 2 correct answers.

View this question

Explain the difference between qualitative and quantitative risk assessment methods. Which method do you prefer, and under what conditions would you choose it over the other?  Support your answer with at least one example scenario.

View this question

Justify your answer to the previous Heartbleed question. In your explanation, discuss the technical vulnerability exploited in Heartbleed.

View this question

A financial services company discovers that some of its legacy servers are still running a vulnerable version of OpenSSL affected by the Heartbleed bug. These servers handle encrypted client authentication sessions and internal API communications. Which statement most accurately describes the technical mechanism and realistic impact of the Heartbleed vulnerability?

View this question

Justify your answer to question 2. Explain why your selected option represents responsible vulnerability disclosure and why the other alternatives do not appropriately manage ethical, legal, and security risks.

View this question

During the vulnerability life cycle, at which stage should you contact the software or hardware vendor about a discovered vulnerability?

0%
33%
33%
0%
0%
0%
0%
View this question

Which actions help mitigate mobile permission vulnerabilities? Select 2 correct answers.

View this question

A social media photo-editing mobile app requests multiple permissions during installation. The app claims these are needed for photo sharing, tagging, and “smart enhancements”. If the app becomes malicious or is compromised, which permission introduces the most dangerous and realistic security attack surface?

33%
0%
0%
33%
33%
33%
33%
0%
0%
View this question

A security analyst uncovers a privilege escalation vulnerability in a widely used project management web platform that allows standard users to gain administrator permissions. The vendor has no formal vulnerability disclosure policy and historically delays responses to similar issues. Which action best reflects responsible vulnerability disclosure in this scenario?

View this question

Want instant access to all verified answers on moodle.bcu.ac.uk?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome