Page 1450 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1450
users from determining classified information by noticing the
absence of information normally available to them?
A. Inference
B. Manipulation
C. Polyinstantiation
D. Aggregation
10. Which one of the following is not a principle of Agile development?
A. Satisfy the customer through early and continuous delivery.
B. Businesspeople and developers work together.
C. Pay continuous attention to technical excellence.
D. Prioritize security over other requirements.
11. What type of information is used to form the basis of an expert
system’s decision-making process?
A. A series of weighted layered computations
B. Combined input from a number of human experts, weighted
according to past performance
C. A series of “if/then” rules codified in a knowledge base
D. A biological decision-making process that simulates the
reasoning process used by the human mind
12. In which phase of the SW-CMM does an organization use
quantitative measures to gain a detailed understanding of the
development process?
A. Initial
B. Repeatable
C. Defined
D. Managed
13. Which of the following acts as a proxy between an application and
a database to support interaction and simplify the work of

