CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 8 ■ Software Development Security (Domain 8) 199



  1. What application development method uses the cycle shown here?


Requirements
Planning

Cutover

User Design Construction

A. Waterfall
B. Spiral
C. Agile
D. RAD


  1. Kathleen is reviewing the Ruby code shown here. What security technique is this
    code using?


A. Parameterization
B. Ty p e c a s t i n g
C. Gem cutting
D. Stored procedures


  1. Susan provides a public RESTful API for her organization’s data but wants to limit its use
    to trusted partners. She intends to use API keys. What other recommendation would you
    give Susan to limit the potential abuse of the service?
    A. Limit request rates
    B. Force HTTP-only requests
    C. Avoid tokens due to bandwidth constraints
    D. Blacklist HTTP methods such as GET, POST, and PUT

Free download pdf