CISSP Sybex Official Study Guide Chapter 20 Review Questions Flashcards

1
Q

Which one of the following is not a component of the DevOps model?

A. Information security
B. Software development
C. Quality assurance
D. IT operations

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 911). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bob is developing a software application and has a field where users may enter a date. He wants to ensure that the values provided by the users are accurate dates to prevent security issues. What technique should Bob use?

A. Polyinstantiation
B. Input validation
C. Contamination
D. Screening

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 911). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What portion of the change management process allows developers to prioritize tasks?

A. Release control
B. Configuration control
C. Request control
D. Change audit

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 911). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What approach to failure management places the system in a high level of security?

A. Fail-open
B. Fail mitigation
C. Fail-secure
D. Fail clear

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 911). Wiley. Kindle Edition.

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 911). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What software development model uses a seven-stage approach with a feedback loop that allows progress one step backward?

A. Boyce-Codd
B. Waterfall
C. Spiral
D. Agile

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 911). Wiley. Kindle Edition.

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 911). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What form of access control is concerned primarily with the data stored by a field?

A. Content-dependent
B. Context-dependent
C. Semantic integrity mechanisms
D. Perturbation

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 911). Wiley. Kindle Edition.

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 911). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which one of the following key types is used to enforce referential integrity between database tables?

A. Candidate key
B. Primary key
C. Foreign key
D. Super key

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 912). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Richard believes that a database user is misusing his privileges to gain information about the company’s overall business trends by issuing queries that combine data from a large number of records. What process is the database user taking advantage of?

A. Inference
B. Contamination
C. Polyinstantiation
D. Aggregation

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 912). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What database technique can be used to prevent unauthorized users from determining classified information by noticing the absence of information normally available to them?

A. Inference
B. Manipulation
C. Polyinstantiation
D. Aggregation

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 912). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which one of the following is not a principle of Agile development?

A. Satisfy the customer through early and continuous delivery.
B. Business people and developers work together.
C. Pay continuous attention to technical excellence.
D. Prioritize security over other requirements.

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 912). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of information is used to form the basis of an expert system’s decision-making process?

A. A series of weighted layered computations
B. Combined input from a number of human experts, weighted according to past performance
C. A series of “if/then” rules codified in a knowledge base
D. A biological decision-making process that simulates the reasoning process used by the human mind

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 912). Wiley. Kindle Edition.

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 912). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly