CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 8 ■ Software Development Security (Domain 8) 177



  1. When using the SDLC, which one of these steps should you take before the others?


A. Functional requirements determination
B. Control specifications development
C. Code review
D. Design review


  1. Jaime is a technical support analyst and is asked to visit a user whose computer is display-
    ing the error message shown here. What state has this computer entered?


A. Fail open
B. Irrecoverable error
C. Memory exhaustion
D. Fail secure


  1. Which one of the following is not a goal of software threat modeling?


A. To reduce the number of security-related design flaws
B. To reduce the number of security-related coding flaws
C. To reduce the severity of non-security-related flaws
D. To reduce the number of threat vectors
Free download pdf