178 Chapter 8 ■ Software Development Security (Domain 8)
- In the diagram shown here, which is an example of a method?
Account
Balance: currency = 0
Owner: string
AddFunds(deposit: currency)
RemoveFunds(withdrawal: currency)
A. Account
B. Owner
C. AddFunds
D. None of the above
- Which one of the following is considered primary storage?
A. Memory
B. Hard disk
C. Flash drive
D. DV D - Which one of the following testing methodologies typically works without access to
source code?
A. Dynamic testing
B. Static testing
C. White box testing
D. Code review - The web application that Lucca built has a flaw that causes users who are logged in to be
able to take actions they should not be able to in their role. What type of security vulner-
ability should this be classified as?
A. Data validation
B. Session management
C. Authorization
D. Error handling - Bobby is investigating how an authorized database user is gaining access to information
outside his normal clearance level. Bobby believes that the user is making use of a type of
function that summarizes data. What term describes this type of function?
A. Inference
B. Polymorphic
C. Aggregate
D. Modular