Page 1450 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1450

users from determining classified information by noticing the
                    absence of information normally available to them?

                    A.  Inference


                    B.  Manipulation

                    C.  Polyinstantiation

                    D.  Aggregation

              10.  Which one of the following is not a principle of Agile development?

                    A.  Satisfy the customer through early and continuous delivery.

                    B.  Businesspeople and developers work together.

                    C.  Pay continuous attention to technical excellence.

                    D.  Prioritize security over other requirements.

               11.  What type of information is used to form the basis of an expert
                    system’s decision-making process?


                    A.  A series of weighted layered computations

                    B.  Combined input from a number of human experts, weighted
                        according to past performance

                    C.  A series of “if/then” rules codified in a knowledge base

                    D.  A biological decision-making process that simulates the
                        reasoning process used by the human mind

               12.  In which phase of the SW-CMM does an organization use
                    quantitative measures to gain a detailed understanding of the

                    development process?

                    A.  Initial

                    B.  Repeatable

                    C.  Defined

                    D.  Managed

               13.  Which of the following acts as a proxy between an application and
                    a database to support interaction and simplify the work of
   1445   1446   1447   1448   1449   1450   1451   1452   1453   1454   1455