CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

188 Chapter 8 ■ Software Development Security (Domain 8)



  1. Roger is conducting a software test for a tax preparation application developed by his
    company. End users will access the application over the Web, but Roger is conducting his
    test on the back end, evaluating the source code on the web server. What type of test is
    Roger conducting?
    A. White box
    B. Gray box
    C. Blue box
    D. Black box

  2. Which of the following statements is true about heuristic-based antimalware software?
    A. It has a lower false positive rate than signature detection.
    B. It requires frequent definition updates to detect new malware.
    C. It has a higher likelihood of detecting zero-day exploits than signature detection.
    D. It monitors systems for files with content known to be viruses.

  3. Martin is inspecting a system where the user reported unusual activity, including disk
    activity when the system is idle and abnormal CPU and network usage. He suspects that
    the machine is infected by a virus but scans come up clean. What malware technique
    might be in use here that would explain the clean scan results?
    A. File infector virus
    B. MBR virus
    C. Service injection virus
    D. Stealth virus

  4. Tomas discovers a line in his application log that appears to correspond with an attempt
    to conduct a directory traversal attack. He believes the attack was conducted using URL
    encoding. The line reads:
    %252E%252E%252F%252E%252E%252Fetc/passwd


What character is represented by the %252E value?
A..
B. ,
C. ;
D. /


  1. An attacker posted a message to a public discussion forum that contains an embedded
    malicious script that is not displayed to the user but executes on the user’s system when
    read. What type of attack is this?
    A. Persistent XSRF
    B. Nonpersistent XSRF

Free download pdf