CSDEV
Application Development Policy
Covers PL 1070 Application Development Policy.
Enter your Username
Please enter your username(email) before you take the quiz.
Application Development Policy
Questions 1 of 20
-
Timer
0
-
Score
0
Application Development Policy
The use of production data during testing is allowed anytime for as long as all security controls implemented in production are applied to the test environment.
True or False
Questions 2 of 20
-
Timer
0
-
Score
0
Application Development Policy
The application's Directly Responsible Individual is responsible for reviewing and monitoring users who have access to an application.
True or False
Questions 3 of 20
-
Timer
0
-
Score
0
Application Development Policy
Cloud Engineers are primarily responsible for managing and monitoring application deployments.
True or False
Questions 4 of 20
-
Timer
0
-
Score
0
Application Development Policy
Security protocols and controls are only required to be analysed, identified and executed for new systems.
True or False
Questions 5 of 20
-
Timer
0
-
Score
0
Application Development Policy
A security test of all applications must be conducted every quarter.
True or False
Questions 6 of 20
-
Timer
0
-
Score
0
Application Development Policy
All applications must have a security seal of Protected or better.
True or False
Questions 7 of 20
-
Timer
0
-
Score
0
Application Development Policy
System capacity requirements need to be reviewed only before the introduction of a new critical business application.
True or False
Questions 8 of 20
-
Timer
0
-
Score
0
Application Development Policy
The review of the Application Development Policy must be done at least once a year.
True or False
Questions 9 of 20
-
Timer
0
-
Score
0
Application Development Policy
The need to maintain the security and integrity of all applications takes precedence over user accessibility.
True or False
Questions 10 of 20
-
Timer
0
-
Score
0
Application Development Policy
All Cloudstaff applications should have a product description containing, among others, a description of what the application is about, what it does and its target users.
Questions 11 of 20
-
Timer
0
-
Score
0
Application Development Policy
Authorised developers shall have access to the testing and production environment's backend codes for products that have an automated deployment pipeline.
True or False
Questions 12 of 20
-
Timer
0
-
Score
0
Application Development Policy
The Technology Leadership shall define, document, maintain and implement principles for engineering secure systems for all layers of their architectural design.
Multiple choice
Questions 13 of 20
-
Timer
0
-
Score
0
Application Development Policy
HTTP/SSL are required to be used only for Cloudstaff web applications that are available to the public.
True or False
Questions 14 of 20
-
Timer
0
-
Score
0
Application Development Policy
All software build and its associated package must be labelled with the appropriate version number.
True or False
Questions 15 of 20
-
Timer
0
-
Score
0
Application Development Policy
The Application Development Policy applies to all Cloudstaff employees.
True or False
Questions 16 of 20
-
Timer
0
-
Score
0
Application Development Policy
The archiving of unused and irrelevant data must be evaluated annually and coordinated with whom?
Multiple choice
Questions 17 of 20
-
Timer
0
-
Score
0
Application Development Policy
The testing environment must be totally separated from the production environment for all applications.
True or False
Questions 18 of 20
-
Timer
0
-
Score
0
Application Development Policy
Violations of the Application Development Policy due to ignorance or by accident will not result in any disciplinary action. Only intentional violations will be subject to disciplinary action.
True or False
Questions 19 of 20
-
Timer
0
-
Score
0
Application Development Policy
Commercial off-the-shelf software (COTS) can be modified in extraordinary circumstances, e.g., when needed for a critical business requirement.
True or False
Questions 20 of 20
-
Timer
0
-
Score
0
Application Development Policy
When it comes to outsourced developments, the contractual requirements for secure design, coding and testing practices must be the same as or more stringent than the ones used by Cloudstaff.
True or False