CISSP Lesson 9 PreTest Flashcards
A PDA has which kind of memory?
A) Persistent
B) Sequential
C) Volatile
Volatile
Network isolation is an example of which type of security architecture?
A) Process isolation
B) Privilege isolation
C) Hardware segmentation
Hardware segmentation
Which statements are true concerning relational databases? Choose all that apply.
A) Contains transparent program integration with object-oriented programming languages
B) Consists of a logical collection of tables
C) Relationships are not stored in the database
D) Stores exactly the same object model that is used at the application level
E) Implements concurrency control
Consists of a logical collection of tables
Relationships are not stored in the database
Preparing data for transfer from client to server is a function of an agent component in a distributed environment.
A) TRUE
B) FALSE
TRUE
NIACAP is the certification standard for which organization?
A) Department of Defense
B) United States Executive Branch
C) US Postal Service
United States Executive Branch
What may be the result of reusing objects?
A) Increased volatility
B) Increased stability
C) Increased risk for attacks
Increased stability
Which is an example of an aggregate function?
A) Count()
B) Select()
C) OR
Count()
What is polyinstantiation?
A) The ability to obtain information of a higher sensitivity by combining information from lower levels of sensitivity
B) The ability to allow multiple database objects to exist with the same key
C) The ability to deduce information about data at sensitivity levels for which a user is not cleared
The ability to allow multiple database objects to exist with the same key
Buffer overflows are always the result of SYN floods.
A) TRUE
B) FALSE
FALSE
What is a downside to developing an application for a local environment?
A) The platform may not be secure
B) The platform is expensive to implement
C) The platform may be volatile
The platform may be volatile
What is a cracker?
A) A person who attempts to compromise a system for an unauthorized purpose
B) A person who has a passion for learning more about computers
C) A person who compromises a telephone company system to obtain free long distance services
A person who attempts to compromise a system for an unauthorized purpose
Which type of attack is a piece of code included in a software product that allows a person to bypass all access controls?
A) Worms
B) Trap doors
C) Logic bombs
Trap doors
Who generally implements pseudo flaws?
A) End users
B) Developers
C) Attackers
Developers
Which column name is the best example of a candidate key?
A) First name
B) Last name
C) Customer number
Customer number
What is the best definition of a foreign key?
A) A duplicate key from another table
B) The primary key from another table
C) The candidate key from another table
The primary key from another table