logo

Crowdly

Browser

Додати до Chrome

CMP5358 Software Security A S1 2025/6

Шукаєте відповіді та рішення тестів для CMP5358 Software Security A S1 2025/6? Перегляньте нашу велику колекцію перевірених відповідей для CMP5358 Software Security A S1 2025/6 в moodle.bcu.ac.uk.

Отримайте миттєвий доступ до точних відповідей та детальних пояснень для питань вашого курсу. Наша платформа, створена спільнотою, допомагає студентам досягати успіху!

Answer the following: 

  1. Have you read the assessment specification in full?
  2. Do you know the required tools for Case 1?
  3. Do you know the necessary tools for Case 3?
  4. Do you see the submission deadline and time?
  5. Do you know where and how to submit your work?
  6. Do you know the expected structure of your report?
  7. Do you know the penalties for late submission?
  8. Do you have any questions about the assessment requirements?
  9. Do you know about the support sessions (online and on campus)
Переглянути це питання

An organisation wants to reduce the risk of permission-related vulnerabilities in its applications and systems. Which strategies directly help prevent permission misuse or over-privilege? Select 2 correct answers.

Переглянути це питання

Explain the difference between qualitative and quantitative risk assessment methods. Which method do you prefer, and under what conditions would you choose it over the other?  Support your answer with at least one example scenario.

Переглянути це питання

Justify your answer to the previous Heartbleed question. In your explanation, discuss the technical vulnerability exploited in Heartbleed.

Переглянути це питання

A financial services company discovers that some of its legacy servers are still running a vulnerable version of OpenSSL affected by the Heartbleed bug. These servers handle encrypted client authentication sessions and internal API communications. Which statement most accurately describes the technical mechanism and realistic impact of the Heartbleed vulnerability?

Переглянути це питання

Justify your answer to question 2. Explain why your selected option represents responsible vulnerability disclosure and why the other alternatives do not appropriately manage ethical, legal, and security risks.

Переглянути це питання

During the vulnerability life cycle, at which stage should you contact the software or hardware vendor about a discovered vulnerability?

0%
33%
33%
0%
0%
0%
0%
Переглянути це питання

Which actions help mitigate mobile permission vulnerabilities? Select 2 correct answers.

Переглянути це питання

A social media photo-editing mobile app requests multiple permissions during installation. The app claims these are needed for photo sharing, tagging, and “smart enhancements”. If the app becomes malicious or is compromised, which permission introduces the most dangerous and realistic security attack surface?

33%
0%
0%
33%
33%
33%
33%
0%
0%
Переглянути це питання

A security analyst uncovers a privilege escalation vulnerability in a widely used project management web platform that allows standard users to gain administrator permissions. The vendor has no formal vulnerability disclosure policy and historically delays responses to similar issues. Which action best reflects responsible vulnerability disclosure in this scenario?

Переглянути це питання

Хочете миттєвий доступ до всіх перевірених відповідей на moodle.bcu.ac.uk?

Отримайте необмежений доступ до відповідей на екзаменаційні питання - встановіть розширення Crowdly зараз!

Browser

Додати до Chrome