Chapter 8 ■ Software Development Security (Domain 8) 195
C. SQL injection
D. Ransomware
- Charles is developing a mission-critical application that has a direct impact on human
safety. Time and cost are less important than correctly functioning software. Which
of the following software development methodologies should he choose given these
requirements?
A. Agile
B. DevOps
C. Spiral
D. Waterfall - Which one of the following types of artificial intelligence attempts to use complex
computations to replicate the partial function of the human mind?
A. Decision support systems
B. Expert systems
C. Knowledge bank
D. Neural networks - At which level of the Software Capability Maturity Model (SW-CMM) does an
organization introduce basic life-cycle management processes?
A. Initial
B. Repeatable
C. Defined
D. Managed
8 7. Lucas runs the accounting systems for his company. The morning after a key employee
was fired, systems began mysteriously losing information. Lucas suspects that the fired
employee tampered with the systems prior to his departure. What type of attack should
Lucas suspect?
A. Privilege escalation
B. SQL injection
C. Logic bomb
D. Remote code execution
- Which one of the following principles would not be favored in an Agile approach to
software development?
A. Processes and tools over individuals and interactions
B. Working software over comprehensive documentation
C. Customer collaboration over contract negotiations
D. Responding to change over following a plan