Page 1448 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1448
Review Questions
1. Which one of the following is not a component of the DevOps
model?
A. Information security
B. Software development
C. Quality assurance
D. IT operations
2. Bob is developing a software application and has a field where
users may enter a date. He wants to ensure that the values
provided by the users are accurate dates to prevent security issues.
What technique should Bob use?
A. Polyinstantiation
B. Input validation
C. Contamination
D. Screening
3. What portion of the change management process allows developers
to prioritize tasks?
A. Release control
B. Configuration control
C. Request control
D. Change audit
4. What approach to failure management places the system in a high
level of security?
A. Fail-open
B. Fail mitigation
C. Fail-secure

