10 - Software Development Security Flashcards

1
Q
  1. When security is increased, what is typically decreased?a. Administrative responsibilitiesb. User functionalityc. Complexity of the systemd. Cost of sustaining the IT environment
A

B: When security is increased, user functionality is usually decreased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which of the following occurrences does not demonstrate foresight and planning on the part of a programmer when a software product encounters a security error?a. Blue screenb. Switching into a non-privileged state upon failurec. Locking out all high-level privilegesd. Rebooting into any available state
A

D: Rebooting into any available state could result in booting into a privileged state which is not the proper outcome when software encounters a security error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Database access is usually indirect access that provides for all but which of the following?a. Confidentiality b. Integrityc. Availabilityd. Controlled interface
A

C: Availability is not ensured with indirect access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following is required in every row of a table in order to maintain uniqueness?a. Cellb. Filec. Primary keyd. Schema
A

C: A primary key is required in every row of a table in order to maintain uniqueness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. An attribute in one table that also serves as the primary key in another table is known as?a. A cross-referenceb. A viewc. Tupled. A foreign key
A

D: A foreign key is an attribute in one table that also serves as the primary key in another table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What is the data that defines or describes the database?a. Schemab. Primary keyc. Data dictionaryd. Base relation
A

A: A schema holds the data that defines or describes the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Why does most software have security disabled by default?a. Ease of installation b. Every environment has different security needsc. Most environments don’t require securityd. Security is dependant upon a security policy
A

A: Most software has security disabled by default for ease of installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What is a collection of related items of the same type?a. Fileb. Record c. Databased. Base relation
A

A: A file is a collection of related items or records of the same type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A tuple is what?a. A table stored in a databaseb. A row stored in a databasec. A column stored in a databased. A column that makes each row of a table unique
A

B: A tuple is a row stored in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What is an attribute?a. A table stored in a databaseb. A column that has a unique value in each rowc. A column in a databased. The data that describes the database
A

C: An attribute is a column in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What database model provides for many-to-many relationships?a. Sequential data modelb. Hierarchical data modelc. Ordinal data modeld. Distributed data model
A

D: A distributed data model offers many-to-many relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. An indication that integrity of the database has been violated is when which following includes a null value?a. primary keyb. cellc. tupled. relation
A

A: If the primary key contains a null value then integrity has been violated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. In a relational database, the number of rows is referred to as?a. Degreeb. Cardinalityc. Prime factord. Tuple
A

B: The number of rows in a relational database is known as the cardinality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which of the following in the design and programming phases of software development can not result in buffer overflows?a. data input block sizeb. ASCII vs. binary inputc. Alpha vs. numeric inputd. English vs. Spanish
A

D: Whether the input is in Spanish or English will not have a direct bearing on a buffer overflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. When a program or operating system experiences a failure state, what should it do?a. save a memory dumpb. revert to a secure statec. restart in privilege moded. automatically reboot
A

B: After a failure state, the program or system should revert to a secure state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which of the following is not true about out of the box security?a. security and functionality are directly proportionalb. security is usually disabled for installationc. security must be configured for the environmentd. security is often a tradeoff for ease of use
A

A: Security and functionality are usually inversely proportional, the greater the security the less functionality a system offers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. What element of new robust software is considered a security failure or downfall?a. platform dependenceb. a wide range of features or functionalityc. interpreted vs. compiled languaged. implementation within a distributed computing environment
A

B: A wide range of features or functionality is considered a security failure or downfall. The more capabilities a system has, the greater the range of its vulnerabilities and risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. What is the primary reason why so much software is unable to handle failures or errors in a secure fashion?a. use of interpreted languagesb. designed to be used in a distributed computing environmentc. circumstances of use are difficult to predict and plan ford. lack of software change management
A

C: The primary reason software is unable to handle failures is a secure fashion is that circumstances of use are difficult to predict and plan for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Since all circumstances of use are difficult to predict and plan for, programmers should?a. not produce softwareb. use only fifth generation programming languagesc. avoid CGI scriptsd. design a general method for handling unexpected failures
A

D: Since all circumstances of use are difficult to predict and plan for, programmers should design into their software a general method for handling unexpected failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. A reliable and controlled software development, design, and coding process is necessary to ensure?a. marketabilityb. securityc. interoperabilityd. compatibility
A

B: A reliable and controlled software development, design, and coding process is necessary to ensure security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Buffer overflows are caused by a programmer failing to compensate for all but which of the following?a. input data block sizeb. ASCII vs. Binary inputc. English vs. Spanishd. alpha vs. numeric
A

C: Buffer overflows are not caused by differences in languages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. Failing to compensate for invalid or extensive values of data types, formats, or lengths in input to programs can cause?a. time of check/time of use attackb. aggregationc. unauthorized alterations of a configuration itemd. buffer overflows
A

D: Failing to compensate for invalid or extensive values of data types, formats, or lengths in input to programs can cause a buffer overflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Environmental controls and hardware devices cannot prevent problems created by?a. bad program codingb. unrestricted physical accessc. lack of boundary controlsd. poor air quality
A

A: Environmental controls and hardware devices cannot prevent problems created by bad program coding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. Which of the following is not one of the standard phases in a the system life cycle?a. penetration testingb. project initiationc. system design specificationsd. maintenance
A

A: Penetration testing is not one of the phases in the system life cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. Which of the following is not one of the standard phases in a the system life cycle?a. functional design analysis and planningb. risk assessmentc. software developmentd. installation
A

B: Risk assessment is not one of the phases in the system life cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. Due care is not related to?a. Good faithb. Prudent manc. Profitd. Best interest
A

C: This is a term not related to Due Care, it’s going to give us the opposite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. If a system encounters a failure and it is prevented from rebooting, this will help avoid what?a. denial of serviceb. initial program load vulnerabilitiesc. time of check/time of use attacksd. inference
A

B: If a system encounters a failure and it is prevented from rebooting, this will help avoid IPL vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. _____________ is most effective if it is planned and managed throughout the lifecycle of a system or application.a. capabilityb. functionalityc. securityd. marketability
A

C: Security is most effective if it is planned and managed throughout the lifecycle of a system or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. _________________ keeps the development project on target and moving toward the goal of a completed product.a. business continuity planningb. change control managementc. facility design and constructiond. project management
A

D: Project management keeps the development project on target and moving toward the goal of a completed product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. If a system should fail for any reason, it should always perform a ______________.a. fail safe operationb. self diagnosticc. fail over maneuverd. privileged restart function
A

A: If a system should fail for any reason, it should always perform a fail safe operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. When testing a newly developed software, system, or solution, all but which of the following should be true?a. all aspects of the system should be testableb. testing should examine how incorrect values are handledc. testing should probe boundary conditionsd. testing should use real or live data
A

D: Testing should never use real or live data. Testing using real data can result in disclosure or alteration of sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. Which of the following is not one of the elements of the software maintenance phase and change control process?a. risk controlb. request controlc. change controld. release control
A

A: Risk control is not one of the elements of the software maintenance phase and change control process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. In what level of the software capability maturity model are project management practices institutionalized?a. initiatingb. repeatablec. definedd. managed
A

B: Security requirements are institutionalized in the repeatable level of the software capability maturity model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  1. The waterfall models allows for what?a. improved managementb. greater control over project progress toward objective completionc. creation of multiple prototypesd. modification only to the immediately previous stage of the life cycle process
A

D: The waterfall model of the life cycle development process allows for modifications only to the immediately previous stage of the life cycle process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  1. Which of the following life cycle phase models allows for all phases of the life cycle process to be repeated?a. spiral modelb. waterfall modelc. modified waterfall modeld. Information security and life cycle model
A

A: The spiral model allows the phases of the life cycle process to be repeated as necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  1. Which life cycle model provides mechanisms for back verification and validation against defined baselines?a. Spiral modelb. Modified waterfall modelc. Clark Wilson modeld. Information security and life cycle model
A

B: The modified waterfall model provides mechanisms for back verification and validation against defined baselines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
  1. According to the Information security and life cycle model, security implemented early in the life cycle process results in all but which of the following?a. greater chance for successb. lower costsc. greater granularityd. reduced work
A

C: The Information security life cycle model does not indicate whether introducing security early in the life cycle process results in greater granularity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
  1. The ability for one object to be removed from a system and replaced with another object is known as?a. polymorphismb. data diddlingc. substitution propertyd. normalization
A

C: The ability for one object to be removed from a system and replaced with another object is known as the substitution property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  1. The communications sent to an object in order to instruct it to perform some operation is known as?a. methodb. behaviorc. delegationd. message
A

D: The communications sent to an object in order to instruct it to perform some operation is known as a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
  1. The code that defines the actions that an object performs in response to an instruction is known as?a. methodb. behaviorc. delegationd. message
A

A: The code that defines the actions that an object performs in response to an instruction is known as a method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
  1. The forwarding of an instruction from one object to another is known as?a. methodb. behaviorc. delegationd. message
A

C: The forwarding of an instruction from one object to another is known as delegation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
  1. Objects in an object oriented programming environment that are created on the fly by software as it executes are known as?a. dynamic lifetime objectsb. transient elementsc. volatile agentsd. distributed computing applets
A

A: Objects in an object oriented programming environment that are created on the fly by software as it executes are known as dynamic lifetime objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
  1. The characteristic of objects in an object oriented programming environment of encapsulation means what?a. objects can produce multiple outputs from the same inputb. objects are self-containedc. objects are more secure that compiled programsd. objects are transient
A

B: Encapsulation means that objects are self-contained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
  1. What programming language can be used directly by computers?a. assembly languageb. artificial intelligence languagesc. machine languaged. interpreted languages
A

C: A computer can only use machine language directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
  1. Which of the following is most susceptible to insertion of malicious code?a. assembly languageb. compiled languagec. commercial softwared. CGI scripts
A

D: CGI scripts, being interpreted, are most susceptible to insertion of malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
  1. Which of the following is true regarding ActiveX?1. Platform independent2. Platform dependent3. Language independent4. Language dependenta. 1 and 3b. 2 and 4c. 2 and 3d. 1 and 4
A

C: ActiveX is platform dependent (Windows only) and language independent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
  1. Which of the following is true regarding Java?1. Platform independent2. Platform dependent3. Language independent4. Language dependenta. 1 and 3b. 2 and 4c. 2 and 3d. 1 and 4
A

D: Java is platform independent and language dependent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
  1. The primary security flaw of ActiveX is?a. It stores controls to the hard driveb. It uses a sandboxc. It is specific to Windows OSes d. It is not language dependant
A

A: The primary security flaw of ActiveX is that it stores controls to the hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
  1. Which of the following is not true about Java applets?a. It uses a sandboxb. It is stored on the hard drivec. It is multithreadedd. It is temporarily stored in memory
A

B: Java applets are not stored to the hard drive, ActiveX is stored to the hard drive.

50
Q
  1. What type of computer system exhibits the same reasoning capabilities as that of a human?a. expert systemb. neural networkc. object oriented systemd. commodore 64
A

A: An expert system is a computer system that exhibits the same reasoning capabilities as that of a human.

51
Q
  1. What type of computer system mimics the functioning of biological neurons?a. expert systemb. neural networkc. object oriented systemd. artifical intelligence system
A

B: A neural network is a computer system that mimics the functioning of biological neurons.

52
Q
  1. Expert systems function using all but which of the following?a. If-then statement rule databasesb. Fuzzy logicc. Delta ruled. Inference engine
A

C: Expert systems do not use the delta rule. Neural networks use the delta rule, the learning rule.

53
Q
  1. Which of the following is not one of the steps used by expert systems when performing fuzzy logic operations?a. Fuzzificationb. Inferencec. Compositiond. Normalization
A

D: Normalization is not one of the steps used in fuzzy logic operations. Normalization is the removal of errors from a database.

54
Q
  1. The most common example of a distributed computing environment (DCE) is which of the following?a. client/serverb. terminal/hostc. stand alone desktop systemd. portable computers
A

A: A client/server system is the most common example of a DCE.

55
Q
  1. Which of the following is not an example of a mobile code language used in a distributed computing environment?a. ActiveXb. Fortranc. Javad. Macromedia Flash
A

B: Fortran is a 3rd generation programming language, but it is not a mobile code language used in DCE.

56
Q
  1. The results of communications sent to an object in order to instruct it to perform some operation is known as?a. methodb. behaviorc. delegationd. message
A

B: The result exhibited by an object upon receipt of an instruction is known as a behavior.

57
Q
  1. The ability for an object to produce different behaviors from the same message is known as?a. methodb. data diddlingc. electronic vaultingd. polymorphism
A

D: The ability for an object to produce different behaviors from the same message is known as polymorphism.

58
Q
  1. The number of rows in a relational database is known as?a. schemab. data dictionaryc. cardinalityd. degree
A

C: The cardinality is the number of rows in a relational database.

59
Q
  1. The number of columns in a relational database is known as?a. schemab. data dictionaryc. cardinalityd. degree
A

D: The degree is the number of columns in a relational database.

60
Q
  1. The data that defines the structure of the database is known as?a. schemab. data dictionaryc. cardinalityd. degree
A

A: The schema is the data that defines the structure of the database.

61
Q
  1. A relational database provides for what types of relationships?a. one-to-oneb. one-to-manyc. many-to-manyd. many-to-one
A

C: A relational database provides for many to many relationships.

62
Q
  1. A hierarchical database provides for what types of relationships?a. one-to-oneb. one-to-manyc. many-to-manyd. many-to-one
A

B: A hierarchical database provides for one-to-many relationships.

63
Q
  1. An intersection of a row and a column in a relational database is known as? a. fileb. tuplec. celld. attribute
A

C: A cell is the intersection of a row and a column.

64
Q
  1. Which of the following is not a means to aid in mitigating the threat of malicious code in a distributed computing environment?a. screen applets at firewallsb. configure browsers to accept code from trusted servers onlyc. avoid using FTPd. train users regarding mobile code
A

C: Avoiding the use of FTP is the least effective means to mitigate the threat of malicious code in a DCE.

65
Q
  1. Which of the following is not one of the three primary models of databases?a. hierarchicalb. distributedc. relationald. dyanmic
A

D: There is no such database model as the dynamic model.

66
Q
  1. A row in a relational database table is known as?a. fileb. tuplec. celld. attribute
A

B: A tuple is a row of a relational database table.

67
Q
  1. The attribute that makes each tuple unique in relational database?a. domainb. candidate keyc. primary keyd. foreign key
A

C: The primary key is the attribute that makes each tuple unique in relational database.

68
Q
  1. A unique attribute from another relational database table is known as?a. domainb. candidate keyc. primary keyd. foreign key
A

D: A foreign key is a unique attribute from another relational database table.

69
Q
  1. The range of allowable or valid values for attributes is known as?a. domainb. candidate keyc. primary keyd. foreign key
A

A: The domain is the range of allowable or valid values for attributes.

70
Q
  1. Attributes in a relational database that provide a unique identifier for tuples is known as?a. domainb. candidate keyc. primary keyd. foreign key
A

B: A candidate key is any attribute in a relational database that provides a unique identifier for tuples.

71
Q
  1. A column in a relational database table is known as?a. fileb. tuplec. celld. attribute
A

D: An attribute is a column in a relational database table.

72
Q
  1. A collection of records of the same type is known as?a. fileb. tuplec. celld. attribute
A

A: A file is a collection of records of the same type.

73
Q
  1. Hiding specific cells in a database to prevent against inference attacks is known as?a. polyinstantiationb. database partitioningc. cell suppressiond. perturbation
A

C: Cell suppression is the technique of hiding specific cells in a database to prevent against inference attacks.

74
Q
  1. A centralized repository of normalized information from various databases that is made available to users to perform queries against is known as?a. data miningb. data martc. data dictionaryd. data warehouse
A

D: A data warehouse is a centralized repository of normalized information from various databases that is made available to users to perform queries against.

75
Q
  1. What type of virus requires just a host program to replicate and distribute itself?a. common virusb. boot virusc. multi-part virusd. macro virus
A

A: A common virus, also known as a file virus, needs only a host program to replicate and distribute itself.

76
Q
  1. The mechanism that ensures that every tuple has a primary key and that primary key is related to an existing record is known as?a. referential integrity mechanismb. concurrencyc. semantic integrity rulesd. transaction management
A

A: The mechanism that ensures that every tuple has a primary key and that that primary key is related to an existing record is the referential integrity mechanism.

77
Q
  1. Which of the following are not elements of transaction management for databases?a. Rollback statementb. Normalizationc. Commit statementd. Checkpoints
A

B: Normalization is a process used on databases to ensure that the attributes of a table depend upon the primary key. However, normalization is not part of transaction management.

78
Q
  1. At what layer of the OSI model does SQL, as a service protocol, operate?a. Layer 3b. Layer 4c. Layer 5d. Layer 6
A

C: SQL operates at layer 5 the Session layer.

79
Q
  1. The central repository for the data elements and their relationships is known as?a. schemab. data dictionaryc. cardinalityd. degree
A

B: The data dictionary is the central repository for the data elements and their relationships.

80
Q
  1. Which of the following is not one of the steps or elements in data normalization?a. eliminating repeating groupsb. eliminating redundant datac. eliminating the possibility of corrupted data by locking cells while they are being editedd. eliminating attributes that are not dependant on the primary key
A

C: Locking cells is an aspect of concurrency protection, not normalization.

81
Q
  1. Semantic integrity rules ensure that all structural and semantic rules of the database are not violated. Which of the following is not something that these rules would examine?a. data typeb. logical valuec. uniqueness constraints d. relevance
A

D: The semantic integrity rules would not address or examine the relevance of the data.

82
Q
  1. What is concurrency?a. A mechanism used to ensure the integrity of database information.b. A mechanism to ensure that structural and semantic rules are not violated.c. A mechanism that ensures that no record contains references to a primary key of a non-existent record. d. A mechanism that terminates the current transaction and cancels all changes made to the database.
A

A: Concurrency is a mechanism used to ensure the integrity of database information.

83
Q
  1. The act of deducing information from higher sensitivity levels from data at their own lower sensitivity level is known as?a. Aggregationb. Inference c. Suppressiond. Perturbation
A

B: Inference is the act of deducing information from higher sensitivity levels from data at their own lower sensitivity level

84
Q
  1. Which of the following is not considered a valid safeguard against viruses?a. file hash valuesb. biometric authenticationc. strong DACL access controlsd. scanning for e-mail born viruses on e-mail gateway systems
A

B: Biometric authentication has no bearing on virus protection.

85
Q
  1. What model of database is useful for mapping or creating many to many relationships?a. Flux model b. Hierarchical model c. Distributed Data model d. Reflective model
A

C: A distributed data model uses many to many relationships.

86
Q
  1. Which of the following conditions indicate that the integrity of an entity has been violated?a. A random value in a cellb. A reoccurring value in a tuplec. A duplicate value in the foreign keyd. A null value in the primary key
A

D: This indicates that the integrity of an entity has been violated.

87
Q
  1. SQL server is not vulnerable to which of the following types of attacks?a. aggregationb. inferencec. salami techniqued. dead lock
A

D: SQL is not vulnerable to dead locks since it supports concurrent transaction through transaction management.

88
Q
  1. When a database system supports transaction management, which of the following is it still vulnerable to, because users have access to data cells?a. inferenceb. deadlockc. denial of serviced. data integrity loss
A

A: Databases may be still vulnerable to inferencing even with transaction management.

89
Q
  1. The user interface for a database enforces indirect access. This type of restricted interface or controlled view provides all but which of the following?a. support for confidentialityb. providing availabilityc. protection from unauthorized disclosured. maintaining integrity
A

B: Database views and client interfaces do not provide availability.

90
Q
  1. What level of the Carnegie Mellon University Software Engineering Institute (SEI)’s Software Capability Maturity Model (CMM) represents the project management processes and ensures that practices are institutionalized?a. Level 5 - Optimizedb. Level 4 - Managedc. Level 3 - Definedd. Level 2 - Repeatable
A

D: Level 2 - Repeatable is focused on the project management processes and ensures that practices are institutionalized.

91
Q
  1. Objects are ___________ of classes that contain their methods.a. Instancesb. Behaviorsc. Aspectsd. Elements
A

A: Objects are instances of classes that contain their methods.

92
Q
  1. The forwarding of a request by an object to another object is known as?a. Inheritanceb. Delegationc. Methodd. Behavior
A

B: Delegation is the forwarding of a request by an object to another object.

93
Q
  1. Within configuration management, what is a component whose state is recorded and changes are measured against that saved state?a. Buildingb. Configuration itemc. Build listd. Software library
A

B: Configuration item is a component whose state is recorded and changes are measured against that saved state.

94
Q
  1. Which procedure of configuration management is responsible for recording the processing of changes?a. Configuration Identificationb. Configuration Controlc. Configuration Status Accounting d. Configuration Audit
A

C: Configuration Status Accounting is the procedure that records the processing of changes.

95
Q
  1. In a relational database, mandatory access controls are imposed by using which of the following mechanisms?a. Access based on subject and object classification levelsb. Access based on subject rolec. Access based on a tuples in an access control matrixd. Access based on biometrics
A

A: Mandatory access control is based on classification levels.

96
Q
  1. What is normalization?a. The process of removing duplicate or redundant data from a databaseb. Is the standardization of all security baselines within an organization.c. A function of fuzzy logic that converts fuzzy output into quantitative numbers.d. Is the process of resetting all security systems to their installed defaults
A

A: Normalization is the process of removing duplicate or redundant data from a database.

97
Q
  1. Which of the following is not true?a. Applets are a form of mobile code distributed via the Web.b. Browsers may assign different security or trust levels to various applets.c. It is easy to alter or duplicate the signature on an applet.d. A signature on an applet informs you about the source of the applet but not the content or quality of the applet
A

C: This is not true. It is not possible to alter or duplicate the signature on an applet.

98
Q
  1. Inference engines are able to manage uncertainty using all but which of the following means?a. Fuzzy logicb. Direct reasoningc. Probability factorsd. Bayesian network theory
A

B: Direct reasoning is not a feature or capability of inference engines.

99
Q
  1. The fineness of access control specification within a database is known as?a. Accuracyb. Granularityc. Cardinalityd. Bayesian Theory
A

B: Granularity is the fineness of access control specification within a database.

100
Q
  1. What is polyinstantiation?a. A mechanism that prevents the creation of entities within a database at a lower sensitivity level when that entity already exists at a higher sensitivity level.b. A mechanism that allows a database table to contain two primary keys.c. A mechanism that allows a duplicate primary key to be created at a lower sensitivity level when the same key already exists at a higher sensitivity level. d. A mechanism for entering the same information into multiple databases simultaneously.
A

C: Polyinstantiation is a mechanism that allows a duplicate primary key to be created at a lower sensitivity level when the same key exists at a higher sensitivity level. This prevents inference.

101
Q
  1. Which software life cycle models allows for modifications to the project to travel only to the previous development stage?a. Spiral modelb. Referential modelc. Series modeld. Waterfall model
A

D: The waterfall model allows for modifications to the project to travel only to the previous development stage.

102
Q
  1. Which of the following is not true when performing testing during product development?a. Testing should use real or live datab. Testing should ensure that only valid value ranges are acceptedc. Testing should verify that incorrect input types are rejectedd. Testing should verify all bounds and conditions of input
A

A: Testing should never use real or live data.

103
Q
  1. What is polymorphism?a. The ability for a block of code to alter itself based on its environmentb. The ability of a database to allow the creation of a duplicate entity at a lower sensitivity level when one already exists at a higher sensitivity level in order to prevent inference attacks.c. The ability of an object to respond differently to the same message.d. The ability for a distributed data model database to integrate information from multiple locations into a single view.
A

C: Polymorphism is the ability of an object to respond differently to the same message.

104
Q
  1. Formerly known as OLE, what object oriented system standard defines the exchange of objects between programs executing on the same system?a. COBRAb. ORBc. DCOMd. COM
A

D: COM or Common Object Model is the standard that defines the exchange of objects between programs executing on the same system.

105
Q
  1. What type of system demonstrates reasoning abilities similar to humans? a. Expert systemb. Artificial Intelligence systemsc. Neural networksd. Clustered networks
A

A: Expert systems demonstrate reasoning abilities similar to humans.

106
Q
  1. Which of the following is correlations between data or data about data?a. Data martb. Metadatac. Data dictionaryd. Data warehouse
A

B: Metadata is correlations between data or data about data.

107
Q
  1. What type of virus attaches itself to a program so it is activated whenever the software is executed?a. Boot virusb. Macro virusc. File virusd. Companion virus
A

C: A file virus attaches itself to a program so it is activated whenever the software is executed.

108
Q
  1. Which of the following is true for centralized systems?a. Numerous platforms execute independent copies of software against independent sets of datab. Easily accommodates change to DCOM objectsc. Protection is afforded by the OS or the platformd. Combines processing capabilities from various platforms
A

C: This is a benefit of centralized systems.

109
Q
  1. Java and ActiveX are both examples of?a. Code that can be run on any platformb. Interpreted programming languagec. Programming languages that operate within a sandboxd. Mobile code
A

D: ActiveX and Java are examples of mobile code.

110
Q
  1. Which of the following is not a countermeasure against malicious code?a. Screening applets at the firewallb. Requiring strong passwordsc. Require signed applets from trusted serversd. Train users for safe Internet usage
A

B: This is not a countermeasure against malicious code.

111
Q
  1. Which of the following is a mandatory access control model for object-oriented systems?a. View Mechanismb. Positive/Negative Authorizationsc. SORIONd. Methods Data Hiding
A

C: SORION is a mandatory access control model for object-oriented systems.

112
Q
  1. An unapproved method of gaining access to a system is known as?a. Least privilegeb. Network accessc. Physical accessd. Backdoor
A

D: An unapproved method of gaining access to a system is known as a backdoor.

113
Q
  1. The biggest issue related to database security is?a. Logic bombsb. Human errorsc. Inference attacksd. Validation errors
A

B: Human errors are the biggest issue related to database security. All other problems can be addressed and countered.

114
Q
  1. Which of the following is not an example of a programming or data attack?a. Brute forceb. Covert channelsc. Logic bombsd. Salami attack
A

A: Brute force is a password attack, not a programming or data attack.

115
Q
  1. What is the most significant disadvantage of using compiled mobile code?a. It can contain hidden malicious codeb. It employs run-time bindingc. It operates very fastd. It is limited to single thread execution
A

A: Compiled code can contain hidden malicious code.

116
Q
  1. A __________ is a form of malicious code that is triggered to perform an activity once a specific event occurs, such as a time period, accessing a online resource, or launching a program.a. Logic bombb. Wormc. Macro virusd. Trojan horse
A

A: A logic bomb is a form of malicious code that is triggered to perform an activity once a specific event occurs, such as a time period, accessing a online resource, or launching a program.

117
Q
  1. Accreditation is what?a. A structured examination of a system’s security policyb. An institutionalized assessment program for the design specifications of a security productc. A formal acceptance of a security certificationd. The degree of confidence that a security measure will work as designed and intended.
A

C: Accreditation is a formal acceptance of a security certification.

118
Q
  1. The primary difference between a virus and a worm is?a. A virus always infects executable programsb. A worm only attempts to replicate itself rather than cause damagec. A virus always destroys data on the infected systemd. A worm seeks to spread itself to other systems
A

D: The primary difference between a virus and a worm is that a worm primarily seeks to spread itself to other systems while a virus seeks to replicate itself within a system.

119
Q
  1. Which of the following is not considered a denial of service attack? a. Consuming bandwidth from a victimb. Sending a limited amount of spam to a victimc. Blocking the ability to respond to legitimate traffic d. Consuming all computing resources
A

B: While spam is unwanted and a large amount can result in a DoS attack, a limited amount of spam is little more than annoying.

120
Q
  1. Countermeasures to the Smurf Denial of Service attack include all but which of the following?a. Disable broadcast capabilities on border routersb. Block spoofed internal packetsc. Deploy host-based IDSd. Disable ICMP traffic
A

C: A network-based IDS may have some affect as a countermeasure against Smurf, but a host-based IDS is ineffective against any DoS.

121
Q
  1. At what point in a product’s development cycle should infosec be introduced?a. Evaluation and testingb. Inceptionc. Design specificationd. Software development
A

B: InfoSec should be introduced into a product’s development cycle from inception.