Chapter 8 ■ Software Development Security (Domain 8) 199
- What application development method uses the cycle shown here?
Requirements
Planning
Cutover
User Design Construction
A. Waterfall
B. Spiral
C. Agile
D. RAD
- Kathleen is reviewing the Ruby code shown here. What security technique is this
code using?
A. Parameterization
B. Ty p e c a s t i n g
C. Gem cutting
D. Stored procedures
- Susan provides a public RESTful API for her organization’s data but wants to limit its use
to trusted partners. She intends to use API keys. What other recommendation would you
give Susan to limit the potential abuse of the service?
A. Limit request rates
B. Force HTTP-only requests
C. Avoid tokens due to bandwidth constraints
D. Blacklist HTTP methods such as GET, POST, and PUT