Deck 5: Software Development Security

Full screen (f)
exit full mode
Question
Certification is the process of technically verifying the solution's effectiveness and security.
Use Space or
up arrow
down arrow
to flip the card.
Question
Each module should be tested separately in a procedure called validation testing.
Question
Live or actual field data is NOT recommended for use in the unit testing procedures.
Question
The Build-and-Fix approach describes a method that although certainly used in the past has been largely discredited.
Question
Assembly languages use symbols or mnemonics to represent sections of complicated binary code.
Question
Compiled code has not yet been translated to binary language.
Question
Polymorphism is the capability of different objects with a common name to react to the same message or input with different output.
Question
Cohesion describes how much interaction one module requires from another module to do its job.
Question
DCOM is a method for sharing objects on a local computer that uses COM as its foundation.
Question
Relational databases use attributes (columns) and tuples (rows) to organize the data in a two-dimensional table.
Question
What is the auditing method that assesses the extent of the system testing and identifies specific program logic that has not been tested called?

A) Unit testing
B) Test data method
C) Validation testing
D) Regression testing
Question
Which test type assesses the way in which the modules work together and determines if functional and security specifications have been met?

A) Unit testing
B) Integration
C) Validation testing
D) Regression testing
Question
Which of the following development models strictly adheres to formal steps and a structured method?

A) JAD
B) Spiral
C) Cleanroom
D) Agile
Question
Which programming language delivers instructions directly to the processor?

A) Assembly
B) Machine
C) High level
D) Very high level
Question
Which of the following is a row in a table?

A) Record
B) Tuple
C) Attribute
D) Schema
Question
In which database model can objects have multiple parents?

A) Hierarchical
B) Network
C) Object-oriented
D) Object-relational
Question
Which Database Interface Language is a replacement for ODBC, extending its functionality to nonrelational databases?

A) XML:DB
B) OLE DB
C) ODBC
D) JDBC
Question
Which process is used to prevent data inference violations?

A) Database Views
B) Database Locks
C) Polyinstantiation
D) OLTP ACID Test
Question
Which property ensures that either all operations are complete, or the database changes are rolled back?

A) Consistency
B) Atomicity
C) Isolation
D) Durability
Question
Which virus type attaches itself to a file, usually an executable file?

A) Parasitic
B) Stealth
C) Polymorphic
D) Macro
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Software Development Security
1
Certification is the process of technically verifying the solution's effectiveness and security.
True
2
Each module should be tested separately in a procedure called validation testing.
False
3
Live or actual field data is NOT recommended for use in the unit testing procedures.
True
4
The Build-and-Fix approach describes a method that although certainly used in the past has been largely discredited.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
Assembly languages use symbols or mnemonics to represent sections of complicated binary code.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
Compiled code has not yet been translated to binary language.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
Polymorphism is the capability of different objects with a common name to react to the same message or input with different output.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
Cohesion describes how much interaction one module requires from another module to do its job.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
DCOM is a method for sharing objects on a local computer that uses COM as its foundation.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
Relational databases use attributes (columns) and tuples (rows) to organize the data in a two-dimensional table.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
What is the auditing method that assesses the extent of the system testing and identifies specific program logic that has not been tested called?

A) Unit testing
B) Test data method
C) Validation testing
D) Regression testing
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Which test type assesses the way in which the modules work together and determines if functional and security specifications have been met?

A) Unit testing
B) Integration
C) Validation testing
D) Regression testing
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following development models strictly adheres to formal steps and a structured method?

A) JAD
B) Spiral
C) Cleanroom
D) Agile
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Which programming language delivers instructions directly to the processor?

A) Assembly
B) Machine
C) High level
D) Very high level
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is a row in a table?

A) Record
B) Tuple
C) Attribute
D) Schema
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
In which database model can objects have multiple parents?

A) Hierarchical
B) Network
C) Object-oriented
D) Object-relational
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
Which Database Interface Language is a replacement for ODBC, extending its functionality to nonrelational databases?

A) XML:DB
B) OLE DB
C) ODBC
D) JDBC
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
Which process is used to prevent data inference violations?

A) Database Views
B) Database Locks
C) Polyinstantiation
D) OLTP ACID Test
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Which property ensures that either all operations are complete, or the database changes are rolled back?

A) Consistency
B) Atomicity
C) Isolation
D) Durability
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Which virus type attaches itself to a file, usually an executable file?

A) Parasitic
B) Stealth
C) Polymorphic
D) Macro
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 20 flashcards in this deck.