Шукаєте відповіді та рішення тестів для CMP5358 Software Security A S1 2025/6? Перегляньте нашу велику колекцію перевірених відповідей для CMP5358 Software Security A S1 2025/6 в moodle.bcu.ac.uk.
Отримайте миттєвий доступ до точних відповідей та детальних пояснень для питань вашого курсу. Наша платформа, створена спільнотою, допомагає студентам досягати успіху!
Answer the following:
An organisation wants to reduce the risk of permission-related vulnerabilities in its applications and systems. Which strategies directly help prevent permission misuse or over-privilege? Select 2 correct answers.
Explain the difference between qualitative and quantitative risk assessment methods. Which method do you prefer, and under what conditions would you choose it over the other? Support your answer with at least one example scenario.
Justify your answer to the previous Heartbleed question. In your explanation, discuss the technical vulnerability exploited in Heartbleed.
A financial services company discovers that some of its legacy servers are still running a vulnerable version of OpenSSL affected by the Heartbleed bug. These servers handle encrypted client authentication sessions and internal API communications. Which statement most accurately describes the technical mechanism and realistic impact of the Heartbleed vulnerability?
Justify your answer to question 2. Explain why your selected option represents responsible vulnerability disclosure and why the other alternatives do not appropriately manage ethical, legal, and security risks.
During the vulnerability life cycle, at which stage should you contact the software or hardware vendor about a discovered vulnerability?
Which actions help mitigate mobile permission vulnerabilities? Select 2 correct answers.
A social media photo-editing mobile app requests multiple permissions during installation. The app claims these are needed for photo sharing, tagging, and “smart enhancements”. If the app becomes malicious or is compromised, which permission introduces the most dangerous and realistic security attack surface?
A security analyst uncovers a privilege escalation vulnerability in a widely used project management web platform that allows standard users to gain administrator permissions. The vendor has no formal vulnerability disclosure policy and historically delays responses to similar issues. Which action best reflects responsible vulnerability disclosure in this scenario?