B: When security is increased, user functionality is usually decreased.
D: Rebooting into any available state could result in booting into a privileged state which is not the proper outcome when software encounters a security error.
C: Availability is not ensured with indirect access.
C: A primary key is required in every row of a table in order to maintain uniqueness.
D: A foreign key is an attribute in one table that also serves as the primary key in another table.
A: A schema holds the data that defines or describes the database.
A: Most software has security disabled by default for ease of installation.
A: A file is a collection of related items or records of the same type.
B: A tuple is a row stored in a database.
C: An attribute is a column in a database.
D: A distributed data model offers many-to-many relationships.
A: If the primary key contains a null value then integrity has been violated.
B: The number of rows in a relational database is known as the cardinality.
D: Whether the input is in Spanish or English will not have a direct bearing on a buffer overflow.
B: After a failure state, the program or system should revert to a secure state.
A: Security and functionality are usually inversely proportional, the greater the security the less functionality a system offers.
B: A wide range of features or functionality is considered a security failure or downfall. The more capabilities a system has, the greater the range of its vulnerabilities and risks.
C: The primary reason software is unable to handle failures is a secure fashion is that circumstances of use are difficult to predict and plan for.
D: Since all circumstances of use are difficult to predict and plan for, programmers should design into their software a general method for handling unexpected failures.
B: A reliable and controlled software development, design, and coding process is necessary to ensure security.
C: Buffer overflows are not caused by differences in languages.
D: Failing to compensate for invalid or extensive values of data types, formats, or lengths in input to programs can cause a buffer overflow.
A: Environmental controls and hardware devices cannot prevent problems created by bad program coding.
A: Penetration testing is not one of the phases in the system life cycle.