CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 8 ■ Software Development Security (Domain 8) 193


7 7. What software development model is shown in the figure?


P1 P2 P3

Plan next phases. Develop and verify
next-level product.

Evaluate alternatives.
Identify and resolve risks.

Determine objectives,
alternatives, and constraints.

Image reprinted from CISSP (ISC) 2 Certified Information Systems Security Professional Official Study
Guide, 7th Edition © John Wiley & Sons 2015, reprinted with permission.

A. Waterfall
B. Agile
C. Lean
D. Spiral


  1. Which of the following database keys is used by an RDBMS to uniquely identify each row
    in a database table?
    A. Foreign key
    B. Primary key
    C. Candidate key
    D. Referential key

  2. Which one of the following change management processes is initiated by users rather than
    developers?
    A. Request control
    B. Change control
    C. Release control
    D. Design review

  3. Which one of the following techniques is an effective countermeasure against some infer-
    ence attacks?
    A. Input validation
    B. Parameterization
    C. Polyinstantiation
    D. Server-side validation

Free download pdf