Page 1451 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1451
programmers?
A. SDLC
B. ODBC
C. DSS
D. Abstraction
14. In what type of software testing does the tester have access to the
underlying source code?
A. Static testing
B. Dynamic testing
C. Cross-site scripting testing
D. Black-box testing
15. What type of chart provides a graphical illustration of a schedule
that helps to plan, coordinate, and track project tasks?
A. Gantt
B. Venn
C. Bar
D. PERT
16. Which database security risk occurs when data from a higher
classification level is mixed with data from a lower classification
level?
A. Aggregation
B. Inference
C. Contamination
D. Polyinstantiation
17. What database security technology involves creating two or more
rows with seemingly identical primary keys that contain different
data for users with different security clearances?
A. Polyinstantiation

