178 Chapter 8 ■ Software Development Security (Domain 8)
- In the diagram shown here, which is an example of a method?
AccountBalance: currency = 0
Owner: stringAddFunds(deposit: currency)
RemoveFunds(withdrawal: currency)A. Account
B. Owner
C. AddFunds
D. None of the above- Which one of the following is considered primary storage?
 A. Memory
 B. Hard disk
 C. Flash drive
 D. DV D
- Which one of the following testing methodologies typically works without access to
 source code?
 A. Dynamic testing
 B. Static testing
 C. White box testing
 D. Code review
- The web application that Lucca built has a flaw that causes users who are logged in to be
 able to take actions they should not be able to in their role. What type of security vulner-
 ability should this be classified as?
 A. Data validation
 B. Session management
 C. Authorization
 D. Error handling
- Bobby is investigating how an authorized database user is gaining access to information
 outside his normal clearance level. Bobby believes that the user is making use of a type of
 function that summarizes data. What term describes this type of function?
 A. Inference
 B. Polymorphic
 C. Aggregate
 D. Modular
