Software Dev Flashcards

1
Q

Which software development life cycle model allows for multiple iterations of the development process, resulting in multiple prototypes, each produced according to a complete design and testing process?

A. Software Capability Maturity model
B. Waterfall model
C. Development cycle
D. Spiral model

A

The spiral model allows developers to repeat iterations of another life cycle model (such as the waterfall model) to produce a number of fully tested prototypes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SW-CMM

IRDMO

A

Software Capability Maturity Model

  1. Initial
  2. Repeatable
  3. Defined
  4. managed
  5. Optimizing

IRDMO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IDEAL

based on CW-CMM

A
  1. Initiating
  2. Diagnosing
  3. Establishing
  4. Acting
  5. Learning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is system accreditation?

A. Formal acceptance of a stated system configuration
B. A functional evaluation of the manufacturer’s goals for each hardware and software component to meet integration standards
C. Acceptance of test results that prove the computer system enforces the security policy
D. The process to specify secure communication between machines

A

Accreditation is the formal acceptance process. Option B is not an appropriate answer because it addresses manufacturer standards. Options C and D are incorrect because there is no way to prove that a configuration enforces a security policy and accreditation does not entail secure communication specification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which one of the following is not part of the change management process?

A. Request control
B. Release control
C. Configuration audit
D. Change control

A

Configuration audit is part of the configuration management process rather than the change control process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is system certification?

A. Formal acceptance of a stated system configuration
B. A technical evaluation of each part of a computer system to assess its compliance with security standards
C. A functional evaluation of the manufacturer’s goals for each hardware and software component to meet integration standards
D. A manufacturer’s certificate stating that all components were installed and configured correctly

A

A system certification is a technical evaluation. Option A describes system accreditation. Options C and D refer to manufacturer standards, not implementation standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which one of the following is not a component of the DevOps model?

A. Information security
B. Software development
C. Quality assurance
D. IT operations

A

The three elements of the DevOps model are software development, quality assurance, and IT operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Richard believes that a database user is misusing his privileges to gain information about the company’s overall business trends by issuing queries that combine data from a large number of records. What process is the database user taking advantage of?

A. Inference
B. Contamination
C. Polyinstantiation
D. Aggregation

A

In this case, the process the database user is taking advantage of is aggregation. Aggregation attacks involve the use of specialized database functions to combine information from a large number of database records to reveal information that may be more sensitive than the information in individual records would reveal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Bell-LaPadula property keeps lower-level subjects from accessing objects with a higher security level?

A. (star) Security Property
B. No write up property
C. No read up property
D. No read down property

A

The no read up property, also called the Simple Security Policy, prohibits subjects from reading a higher security level object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which security model addresses data confidentiality?

A. Bell-LaPadula
B. Biba
C. Clark-Wilson
D. Brewer and Nash

A

Only the Bell-LaPadula model addresses data confidentiality.

The Biba and Clark-Wilson models address data integrity.

The Brewer and Nash model prevents conflicts of interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In a relational database, what type of key is used to uniquely identify a record in a table and can have multiple instances per table?

A. Candidate key
B. Primary key
C. Unique key
D. Foreign key

A

A

A candidate key is a subset of attributes that can be used to uniquely identify any record in a table. No two records in the same table will ever contain the same values for all attributes composing a candidate key. Each table may have one or more candidate keys, which are chosen from column headings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

During what phase of incident response do you collect evidence such as firewall logs?

A. Detection
B. Response
C. Compliance
D. Remediation

A

B

Evidence collection takes place during the response phase of the incident. Incidents are identified and verified during the detection phase. Compliance with laws might occur during the reporting phase, depending on the incident. Personnel typically perform a root-cause analysis during the remediation phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When establishing who someone is before you grant them access to resources, what is the first step?

A. Verify credentials
B. Claim an identity
C. Grant authority
D. Monitor activity

A

B
The first step toward granting a user access is for them to claim an identity (identification). That is followed by verifying credentials (authentication), then by granting authority (authorization), and finally by monitoring activity (auditing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What rule of evidence states that a written agreement is assumed to contain all terms of the agreement?

A. Real evidence
B. Best evidence
C. Parol evidence
D. Chain of evidence

A

c
The parol evidence rule states that when an agreement between parties is put into written form, the written document is assumed to contain all the terms of the agreement, and no verbal agreements may modify the written agreement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly