Exam 5: Software Development Security
Exam 1: The Cissp Exam10 Questions
Exam 2: Access Control20 Questions
Exam 3: Telecommunications and Network Security19 Questions
Exam 4: Information Security Governance and Risk Management20 Questions
Exam 5: Software Development Security20 Questions
Exam 6: Cryptography20 Questions
Exam 7: Security Architecture and Design20 Questions
Exam 8: Operations Security19 Questions
Exam 9: Business Continuity and Disaster Recovery20 Questions
Exam 10: Legal, Regulations, Investigations, and Compliance20 Questions
Exam 11: Physical Environmental Security20 Questions
Select questions type
Which Database Interface Language is a replacement for ODBC, extending its functionality to nonrelational databases?
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
B
DCOM is a method for sharing objects on a local computer that uses COM as its foundation.
Free
(True/False)
4.8/5
(35)
Correct Answer:
False
Which property ensures that either all operations are complete, or the database changes are rolled back?
Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
B
Each module should be tested separately in a procedure called validation testing.
(True/False)
4.7/5
(34)
Polymorphism is the capability of different objects with a common name to react to the same message or input with different output.
(True/False)
4.8/5
(42)
Certification is the process of technically verifying the solution's effectiveness and security.
(True/False)
4.8/5
(34)
What is the auditing method that assesses the extent of the system testing and identifies specific program logic that has not been tested called?
(Multiple Choice)
4.9/5
(27)
Assembly languages use symbols or mnemonics to represent sections of complicated binary code.
(True/False)
4.7/5
(23)
Live or actual field data is NOT recommended for use in the unit testing procedures.
(True/False)
4.8/5
(35)
Which process is used to prevent data inference violations?
(Multiple Choice)
4.8/5
(29)
The Build-and-Fix approach describes a method that although certainly used in the past has been largely discredited.
(True/False)
4.8/5
(34)
Cohesion describes how much interaction one module requires from another module to do its job.
(True/False)
4.8/5
(34)
Which of the following development models strictly adheres to formal steps and a structured method?
(Multiple Choice)
4.9/5
(36)
Which test type assesses the way in which the modules work together and determines if functional and security specifications have been met?
(Multiple Choice)
4.9/5
(41)
Which programming language delivers instructions directly to the processor?
(Multiple Choice)
4.7/5
(34)
Relational databases use attributes (columns) and tuples (rows) to organize the data in a two-dimensional table.
(True/False)
4.8/5
(35)
Which virus type attaches itself to a file, usually an executable file?
(Multiple Choice)
4.9/5
(32)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)