Page 1568 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1568
experience of human experts.
12. D. In the Managed phase, level 4 of the SW-CMM, the organization
uses quantitative measures to gain a detailed understanding of the
development process.
13. B. ODBC acts as a proxy between applications and the backend
DBMS.
14. A. In order to conduct a static test, the tester must have access to
the underlying source code.
15. A. A Gantt chart is a type of bar chart that shows the
interrelationships over time between projects and schedules. It
provides a graphical illustration of a schedule that helps to plan,
coordinate, and track specific tasks in a project.
16. C. Contamination is the mixing of data from a higher classification
level and/or need-to-know requirement with data from a lower
classification level and/or need-to-know requirement.
17. A. Database developers use polyinstantiation, the creation of
multiple records that seem to have the same primary key, to
protect against inference attacks.
18. C. Configuration audit is part of the configuration management
process rather than the change control process.
19. C. The isolation principle states that two transactions operating on
the same data must be temporarily separated from each other such
that one does not interfere with the other.
20. B. The cardinality of a table refers to the number of rows in the
table while the degree of a table is the number of columns.

