Page 1449 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1449

D.  Fail clear

                5.  What software development model uses a seven-stage approach
                    with a feedback loop that allows progress one step backward?


                    A.  Boyce-Codd

                    B.  Waterfall

                    C.  Spiral

                    D.  Agile

                6.  What form of access control is concerned primarily with the data
                    stored by a field?

                    A.  Content-dependent

                    B.  Context-dependent

                    C.  Semantic integrity mechanisms

                    D.  Perturbation


                7.  Which one of the following key types is used to enforce referential
                    integrity between database tables?

                    A.  Candidate key

                    B.  Primary key

                    C.  Foreign key

                    D.  Super key

                8.  Richard believes that a database user is misusing his privileges to
                    gain information about the company’s overall business trends by

                    issuing queries that combine data from a large number of records.
                    What process is the database user taking advantage of?

                    A.  Inference

                    B.  Contamination

                    C.  Polyinstantiation

                    D.  Aggregation

                9.  What database technique can be used to prevent unauthorized
   1444   1445   1446   1447   1448   1449   1450   1451   1452   1453   1454