Page 1451 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1451

programmers?

                    A.  SDLC


                    B.  ODBC
                    C.  DSS


                    D.  Abstraction

               14.  In what type of software testing does the tester have access to the
                    underlying source code?

                    A.  Static testing

                    B.  Dynamic testing

                    C.  Cross-site scripting testing

                    D.  Black-box testing

               15.  What type of chart provides a graphical illustration of a schedule
                    that helps to plan, coordinate, and track project tasks?


                    A.  Gantt

                    B.  Venn

                    C.  Bar

                    D.  PERT

               16.  Which database security risk occurs when data from a higher
                    classification level is mixed with data from a lower classification
                    level?

                    A.  Aggregation

                    B.  Inference


                    C.  Contamination

                    D.  Polyinstantiation

               17.  What database security technology involves creating two or more
                    rows with seemingly identical primary keys that contain different
                    data for users with different security clearances?

                    A.  Polyinstantiation
   1446   1447   1448   1449   1450   1451   1452   1453   1454   1455   1456