CISSP-D8 Software Development Security Questions With complete verified solutions already graded A+(PASS GUARANTEED)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/68

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

69 Terms

1
New cards

Release Control

Which process is responsible for ensuring that changes to software include acceptance testing?

2
New cards

Cross-Site Request Forgery (CSRF)

Which attack type attempts to exploit the trust relationship that a user's browser has with other websites by forcing the submission of an authenticated request to a 3rd party site?

3
New cards

Durability

ACID: What property of relational databases ensures that once a database transaction is committed to the database, it is preserved?

4
New cards

User Acceptance Testing (UAT)

Which software testing type usually occurs last and is executed against test scenarios?

5
New cards

Lost Update

Name a database issue that occurs when one transaction writes a value to the database that overwrites a value that was needed by transactions with earlier precedence.

6
New cards

Race Condition

What type of vulnerability does a TOC/TOU attack target?

7
New cards

Reflected Input

Name a condition that may make an application most vulnerable to a cross-site scripting (XSS) attack.

8
New cards

Knowledge Bank and Reference Engine

What are the two components of an expert system?

9
New cards

Gray Box

(blank) box test, the tester evaluates the software from a user perspective but has access to the source code as the test is conducted.

10
New cards

White Box

(blank) box tests have access to the source code but perform testing from a developer's perspective.

11
New cards

Black Box

(blank) box tests work form a user's perspective but do not have access to the source code.

12
New cards

Request Control

Name a change management process initiated by users rather than developers.

13
New cards

Polyinstantiation

Name an effective countermeasure against OOP inference attacks.

14
New cards

Repeatable

At which level of SW-CMM does an organization introduce basic life-cycle management processes?

15
New cards

Requirements, Design, Coding, Testing, Maintenance

What are the Waterfall steps?

16
New cards

Atomicity

ACID: Which component ensures that database transactions are "all or nothing"?

17
New cards

Dirty Read

Name a database concurrency issue that occurs when one transaction reads information that was written to a database by a second transaction that is never committed.

18
New cards

Master Boot Record (MBR) Virus

What type of virus works by altering the system boot process to redirect the BIOS to load malware before the operating system loads.

19
New cards

Multipartite Virus

Name a virus characterized by the use of two or more different propagation mechanisms to improve its likelihood of spreading between systems.

20
New cards

Attack Surface

(blank) is the collection of possible entry points for an attacker.

21
New cards

Threat Modeling

(blank) is a systematic approach used to understand how different threats could be realized and how a successful compromise could take place.

22
New cards

Fuzzing

(blank) is the act of sending random data to the target program in order to trigger failures.

23
New cards

ISO 27034

ISO (blank) covers application security

24
New cards

Initial, Repeatable, Defined, Managed, Optimizing

Name the (5) CMMI maturity levels

25
New cards

Software Configuration Management (SCM)

(blank) is the task of tracking and controlling changes in the software through the use of authentication, revision control, the establishment of baselines, and auditing.

26
New cards

Object-Oriented Programming (OOP)

(blank) programming provides modularity, reusability, and more granular control within the programs themselves compared to classical programming languages.

27
New cards

Messages

OOP objects communicate with each other through (blank)

28
New cards

Polymorphism

(blank) is when different objects are given the same input and react differently.

29
New cards

Data Hiding

(blank) is when data and operations internal to objects are hidden from other objects.

30
New cards

Common Object Request Broker Architecture (CORBA)

(blank) provides a standardized way for objects within different applications, platforms, and environments to communicate.

31
New cards

Expert System

What form of AI uses a knowledge base and an inference engine?

32
New cards

Data Definition Language

(blank) What type of database language is used to create, modify, and delete tables?

33
New cards

Cross-Site Request Forgery (CSRF)

Which vulnerability allows a 3rd party to redirect static content within the security context of a trusted site?

34
New cards

Replicated Database

What database high availability option allows multiple clients to access multiple database servers simultaneously?

35
New cards

Component Object Model (COM)

(blank) provides an architecture for components to interact on local system.

36
New cards

Distributed COM (DCOM)

(blank) uses the same interfaces as COM, but enables components to interact over a distributed, or networked environment.

37
New cards

Open Database Connectivity (ODBC)

(blank) enables several different applications to communicate with several different types of databases by calling the required driver and passing data through that driver.

38
New cards

Object Linking and Embedding (OLE)

(blank) enables a program to call another program (linking) and permits a piece of data to be inserted inside another program or document (embedding).

39
New cards

Service-Oriented Architectures (SOA)

(blank) provides standardized access to the most needed services to many different applications at one time.

40
New cards

Non-persistent XSS

(blank) XSS attack exploits the lack of proper input or output validation on dynamic websites.

41
New cards

Persistent XSS

(blank) XSS attack loads malicious code on a server that attacks visiting browsers.

42
New cards

DOM attack

(blank) XSS attack uses the DOM environment to modify the original client-side JavaScript.

43
New cards

Database Management System (DBMS)

(blank) is the software that controls the access restrictions, data integrity, redundancy, and the different types of manipulation available for a database.

44
New cards

Rows (Tuples) and Columns (attributes)

A relational database uses two-dimensional tables with (blank) and (blank)

45
New cards

Data Dictionary

A (blank) is a central repository that describes the data elements within a database and their relationships.

46
New cards

Database Integrity

(blank) is provided by concurrency mechanisms.

47
New cards

Entity Integrity

(blank) integrity makes sure that a row (tuple) is uniquely identified by a primary key.

48
New cards

Referential Integrity

(blank) integrity ensures that every foreign key refers to an existing primary key.

49
New cards

Partitioning the Database, Cell Suppression, Adding noise to the database

Name common ways to prevent database inference attacks

50
New cards

Polyinstantiation

(blank) is the process of allowing a table to have multiple rows with the same primary key. The different instances can be distinguished by their security levels or classification

51
New cards

Data Warehousing

(blank) is the process of searching, filtering, and associating data held within a data warehouse to provide more useful information to users.

52
New cards

Atomicity

ACID: (blank) divides transactions into units of work and ensures that all modifications take effect or none takes effect.

53
New cards

Consistency

ACID: (blank) a transaction must follow the integrity policy developed for that particular database and ensure all data is consistent in the different databases.

54
New cards

Isolation

ACID: (blank) transactions execute in isolation until completed, without interacting with other transactions.

55
New cards

Durability

ACID: (blank) once the transaction is verified as accurate on all systems, it is committed and the databases cannot be rolled back.

56
New cards

Requirements Gathering, Design, Development, Testing, Release

What are the phases of the Software Development Lifecyle

57
New cards

Unit Testing

SW (blank) testing: Testing individual components in a controlled environment where programmers validate data structure, logic, and boundary conditions.

58
New cards

Integration Testing

SW (blank) testing: Verifying that components work together as outlined in design specifications.

59
New cards

Acceptance Testing

SW (blank) testing: Ensuring that the code meets customer requirements.

60
New cards

Regression Testing

SW (blank) testing: After a change to a system takes place, retesting to ensure functionality, performance, and protection.

61
New cards

Fuzzing

(blank) is a software testing technique that provides invalid, unexpected, or random data to the input interfaces of a program.

62
New cards

Deferred Commitment

OOP: (blank) is when the internal components of an object can be redefined without changing other parts of the system.

63
New cards

Covert Channel

(blank) an information that is not controlled by a security control

64
New cards

Data Mining

(blank) the practice of examining large databases in order to generate new information.

65
New cards

Rapid Application Development (RAD)

(blank) a form of rapid prototyping that requires strict time limits on each phase and relies on tools that enable quick development

66
New cards

Software Assurance (SA)

(blank) level of confidence that software is free from defects

67
New cards

Time Multiplexing

(blank) allows the OS to provide well-defined and structured access to processes that need to use resources according to a controlled and tightly managed schedule.

68
New cards

Time of Check / Time of Use (TOC/TOU)

(blank) attack. Takes advantage of the dependency on the timing of events that takes place in a multitasking operating system.

69
New cards

Common Object Request Broker (CORBA)

(blank) a set of standards that addresses the need for interoperability between hardware and software products.