CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

178 Chapter 8 ■ Software Development Security (Domain 8)



  1. In the diagram shown here, which is an example of a method?


Account

Balance: currency = 0
Owner: string

AddFunds(deposit: currency)
RemoveFunds(withdrawal: currency)

A. Account
B. Owner
C. AddFunds
D. None of the above


  1. Which one of the following is considered primary storage?
    A. Memory
    B. Hard disk
    C. Flash drive
    D. DV D

  2. Which one of the following testing methodologies typically works without access to
    source code?
    A. Dynamic testing
    B. Static testing
    C. White box testing
    D. Code review

  3. The web application that Lucca built has a flaw that causes users who are logged in to be
    able to take actions they should not be able to in their role. What type of security vulner-
    ability should this be classified as?
    A. Data validation
    B. Session management
    C. Authorization
    D. Error handling

  4. Bobby is investigating how an authorized database user is gaining access to information
    outside his normal clearance level. Bobby believes that the user is making use of a type of
    function that summarizes data. What term describes this type of function?
    A. Inference
    B. Polymorphic
    C. Aggregate
    D. Modular

Free download pdf