PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What of the following vulnerabilities is present in the below source code file named ‘AuthenticatedArea.php

What of the following vulnerabilities is present in the below source code file named
‘AuthenticatedArea.php’?
<html><head><title>AuthenticatedArea</title></head>
<?
include (“/inc/common.php”);
$username = $_REQUEST[‘username’];
if ($username != “”) {
echo “Your username is: “ . $_REQUEST[‘username’];
}else {
header)(“location: /login.php”

}
?>
</html>

how many years will it take to see a positive ROI?

To support a software security initiative business case, a project manager needs to provide a cost
benefit analysis. The project manager has asked the security consultant to perform a return on
investment study. It has been estimated that by spending $300,000 on the software security
initiative, a 30% savings in cost will be realized for each project. Based on an average of 8
software projects at a current cost of $50,000 each, how many years will it take to see a positive
ROI?

Which of the following should the administrator use to reproduce the issue?

During user acceptance testing, the security administrator believes to have discovered an issue in
the login prompt of the company’s financial system. While entering the username and password,
the program crashed and displayed the system command prompt. The security administrator
believes that one of the fields may have been mistyped and wants to reproduce the issue to report
it to the software developers. Which of the following should the administrator use to reproduce the
issue?