CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

400 Appendix ■ Answers


6 4. C. The Agile Manifesto includes 12 principles for software development. Three of those
are listed as answer choices: maximizing the amount of work not done is essential, build
projects around motivated individuals, and welcome changing requirements throughout
the development process. Agile does not, however, consider clear documentation the
primary measure of progress. Instead, working software is the primary measure of
progress.


  1. The code testing methods match to their definitions as follows:

    1. Regression testing: C. A testing method that is used to verify that previously tested
      software performs the same way after changes are made.

    2. Integration testing: D. A testing method used to validate how software modules
      work together.

    3. Unit testing: B. A testing method that focuses on modules or smaller sections of code
      for testing.

    4. System testing: A. Testing on a complete integrated product.



  2. D. Expert systems have two components: a knowledge bank that contains the collected
    wisdom of human experts and an inference engine that allows the expert systems to
    draw conclusions about new situations based on the information contained within the
    knowledge bank.


6 7. D. A key-value store is an example of a NoSQL database that does not follow a
relational or hierarchical model like traditional databases. A graph database is another
example of a NoSQL database, but it uses nodes and edges to store data rather than keys
and values.


  1. C. A database failure in the middle of a transaction causes the rollback of the entire
    transaction. In this scenario, the database would not execute either command.

  2. B. In the diagram, Account is the name of the class. Owner and Balance are attributes of
    that class. AddFunds and RemoveFunds are methods of the class.

  3. B. Static testing performs code analysis in an offline fashion, without actually executing
    the code. Dynamic testing evaluates code in a runtime environment. Both static and
    dynamic testing may use automated tools, and both are important security testing
    techniques.

  4. D. The chart shown in the figure is a Gantt chart, showing the proposed start and end
    dates for different activities. It is developed based on the work breakdown structure
    (WBS), which is developed based on functional requirements. Program Evaluation Review
    Technique (PERT) charts show the project schedule as a series of numbered nodes.

  5. D. In a gray box test, the tester evaluates the software from a user perspective but has
    access to the source code as the test is conducted. White box tests also have access to the
    source code but perform testing from a developer’s perspective. Black box tests work from
    a user’s perspective but do not have access to source code. Blue boxes are a telephone
    hacking tool and not a software testing technique.

Free download pdf