CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

180 Chapter 8 ■ Software Development Security (Domain 8)



  1. Robert is working with Acme Widgets on a strategy to advance their software develop-
    ment practices. What SW-CMM stage should be their next target milestone?
    A. Defined
    B. Repeatable
    C. Initial
    D. Managed

  2. What phase of the SW-CMM should Robert report as the current status of Beta Particles?
    A. Defined
    B. Repeatable
    C. Optimizing
    D. Managed

  3. Robert is also working with Beta Particles on a strategy to advance their software develop-
    ment practices. What SW-CMM stage should be their next target milestone?
    A. Defined
    B. Repeatable
    C. Optimizing
    D. Managed

  4. Which one of the following database keys is used to enforce referential integrity relation-
    ships between tables?
    A. Primary key
    B. Candidate key
    C. Foreign key
    D. Master key

  5. Which one of the following files is most likely to contain a macro virus?
    A. projections.doc
    B. command.com
    C. command.exe
    D. loopmaster.exe

  6. Victor created a database table that contains information on his organization’s employees.
    The table contains the employee’s user ID, three different telephone number fields (home,
    work, and mobile), the employee’s office location, and the employee’s job title. There are
    16 records in the table. What is the degree of this table?
    A. 3
    B. 4
    C. 6
    D. 16

Free download pdf