Page 1448 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1448

Review Questions



                1.  Which one of the following is not a component of the DevOps
                    model?

                    A.  Information security

                    B.  Software development

                    C.  Quality assurance

                    D.  IT operations

                2.  Bob is developing a software application and has a field where
                    users may enter a date. He wants to ensure that the values

                    provided by the users are accurate dates to prevent security issues.
                    What technique should Bob use?

                    A.  Polyinstantiation

                    B.  Input validation

                    C.  Contamination

                    D.  Screening

                3.  What portion of the change management process allows developers
                    to prioritize tasks?


                    A.  Release control

                    B.  Configuration control

                    C.  Request control

                    D.  Change audit

                4.  What approach to failure management places the system in a high
                    level of security?

                    A.  Fail-open

                    B.  Fail mitigation

                    C.  Fail-secure
   1443   1444   1445   1446   1447   1448   1449   1450   1451   1452   1453