CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 8 ■ Software Development Security (Domain 8) 195


C. SQL injection
D. Ransomware


  1. Charles is developing a mission-critical application that has a direct impact on human
    safety. Time and cost are less important than correctly functioning software. Which
    of the following software development methodologies should he choose given these
    requirements?
    A. Agile
    B. DevOps
    C. Spiral
    D. Waterfall

  2. Which one of the following types of artificial intelligence attempts to use complex
    computations to replicate the partial function of the human mind?
    A. Decision support systems
    B. Expert systems
    C. Knowledge bank
    D. Neural networks

  3. At which level of the Software Capability Maturity Model (SW-CMM) does an
    organization introduce basic life-cycle management processes?
    A. Initial
    B. Repeatable
    C. Defined
    D. Managed


8 7. Lucas runs the accounting systems for his company. The morning after a key employee
was fired, systems began mysteriously losing information. Lucas suspects that the fired
employee tampered with the systems prior to his departure. What type of attack should
Lucas suspect?
A. Privilege escalation
B. SQL injection
C. Logic bomb
D. Remote code execution



  1. Which one of the following principles would not be favored in an Agile approach to
    software development?
    A. Processes and tools over individuals and interactions
    B. Working software over comprehensive documentation
    C. Customer collaboration over contract negotiations
    D. Responding to change over following a plan

Free download pdf