Page 1449 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1449
D. Fail clear
5. What software development model uses a seven-stage approach
with a feedback loop that allows progress one step backward?
A. Boyce-Codd
B. Waterfall
C. Spiral
D. Agile
6. What form of access control is concerned primarily with the data
stored by a field?
A. Content-dependent
B. Context-dependent
C. Semantic integrity mechanisms
D. Perturbation
7. Which one of the following key types is used to enforce referential
integrity between database tables?
A. Candidate key
B. Primary key
C. Foreign key
D. Super key
8. Richard believes that a database user is misusing his privileges to
gain information about the company’s overall business trends by
issuing queries that combine data from a large number of records.
What process is the database user taking advantage of?
A. Inference
B. Contamination
C. Polyinstantiation
D. Aggregation
9. What database technique can be used to prevent unauthorized

