Chapter 20 – Software Development Security Flashcards
1
Q
- Which one of the following is not a component of the DevOps model?
Information security
A
Information security
2
Q
- Bob is developing a software application and has a field where users may enter a date. He wants to ensure that the values provided by the users are accurate dates to prevent security issues. What technique should Bob use?
Input validation
A
Input validation
3
Q
- What portion of the change management process allows developers to prioritize tasks?
Request control
A
Request control
4
Q
- What approach to failure management places the system in a high level of security?
Fail-secue
A
Fail-secure
5
Q
- What software development model uses a seven-stage approach with a feedback loop that allows progress one step backward?
Waterfall
A
Waterfall
6
Q
- What form of access control is concerned primarily with the data stored by a field?
Content-dependent
A
Content-dependent
7
Q
- Which one of the following key types is used to enforce referential integrity between database tables?
Foreign key
A
Foreign key
8
Q
- Richard believes that a database user is misusing his privileges to gain information about the company’s overall business trends by issuing queries that combine data from a large number of records. What process is the database user taking advantage of?
Aggregation
A
Aggregation
9
Q
- What database technique can be used to prevent unauthorized users from determining classified information by noticing the absence of information normally available to them?
Polyinstantiation
A
Polyinstantiation
10
Q
- Which one of the following is not a principle of Agile development?
A series of “if/then” rules codified in a knowledge base
A
A series of “if/then” rules codified in a knowledge base