CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 8 ■ Software Development Security (Domain 8) 187


C. SQL injection
D. Cross-site request forgery


  1. Which one of the following is not an effective control against SQL injection attacks?


A. Escaping
B. Client-side input validation
C. Parameterization
D. Limiting database permissions


  1. What type of project management tool is shown in the figure?


t=3 mo
A
B

50

40

20

10 30

C

E

FD

t=3 mo

t=3 mo

t=4 mo t=3 mo

t=1 mo

A. WBS chart
B. PERT chart
C. Gantt chart
D. Wireframe diagram


  1. In what software testing technique does the evaluator retest a large number of scenarios
    each time that the software changes to verify that the results are consistent with a standard
    baseline?
    A. Orthogonal array testing
    B. Pattern testing
    C. Matrix testing
    D. Regression testing

  2. Which one of the following conditions may make an application most vulnerable to a
    cross-site scripting (XSS) attack?
    A. Input validation
    B. Reflected input
    C. Unpatched server
    D. Promiscuous firewall rules

Free download pdf