Page 1568 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1568

experience of human experts.

               12.  D. In the Managed phase, level 4 of the SW-CMM, the organization
                    uses quantitative measures to gain a detailed understanding of the

                    development process.

               13.  B. ODBC acts as a proxy between applications and the backend
                    DBMS.

               14.  A. In order to conduct a static test, the tester must have access to
                    the underlying source code.

               15.  A. A Gantt chart is a type of bar chart that shows the
                    interrelationships over time between projects and schedules. It

                    provides a graphical illustration of a schedule that helps to plan,
                    coordinate, and track specific tasks in a project.

               16.  C. Contamination is the mixing of data from a higher classification
                    level and/or need-to-know requirement with data from a lower
                    classification level and/or need-to-know requirement.

               17.  A. Database developers use polyinstantiation, the creation of
                    multiple records that seem to have the same primary key, to

                    protect against inference attacks.

              18.  C. Configuration audit is part of the configuration management
                    process rather than the change control process.

               19.  C. The isolation principle states that two transactions operating on
                    the same data must be temporarily separated from each other such
                    that one does not interfere with the other.

              20.  B. The cardinality of a table refers to the number of rows in the

                    table while the degree of a table is the number of columns.
   1563   1564   1565   1566   1567   1568   1569   1570   1571   1572   1573