Chapter 20 – Software Development Security Flashcards

1
Q
  1. Which one of the following is not a component of the DevOps model?
    Information security
A

Information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Bob is developing a software application and has a field where users may enter a date. He wants to ensure that the values provided by the users are accurate dates to prevent security issues. What technique should Bob use?
    Input validation
A

Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What portion of the change management process allows developers to prioritize tasks?
    Request control
A

Request control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What approach to failure management places the system in a high level of security?
    Fail-secue
A

Fail-secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What software development model uses a seven-stage approach with a feedback loop that allows progress one step backward?
    Waterfall
A

Waterfall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What form of access control is concerned primarily with the data stored by a field?
    Content-dependent
A

Content-dependent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which one of the following key types is used to enforce referential integrity between database tables?
    Foreign key
A

Foreign key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Richard believes that a database user is misusing his privileges to gain information about the company’s overall business trends by issuing queries that combine data from a large number of records. What process is the database user taking advantage of?
    Aggregation
A

Aggregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What database technique can be used to prevent unauthorized users from determining classified information by noticing the absence of information normally available to them?
    Polyinstantiation
A

Polyinstantiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which one of the following is not a principle of Agile development?
    A series of “if/then” rules codified in a knowledge base
A

A series of “if/then” rules codified in a knowledge base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly