A. Information security
B. Software development
C. Quality assurance
D. IT operations
Answer: A
The three elements of the DevOps model are software development, quality assurance, and IT operations
A. Polyinstantiation
B. Input validation
C. Contamination
D. Screening
Answer: B
Input validation ensures that the input provided by users matches the design parameters.
A. Release control
B. Configuration control
C. Request control
D. Change audit
Answer: C
The request control provides users with a framework to request changes and developers with the opportunity to prioritize those requests.
A. Fail open
B. Fail mitigation
C. Fail secure
D. Fail clear
Answer: C
In a fail-secure state, the system remains in a high level of security until an administrator intervenes.
A. Boyce-Codd
B. Waterfall
C. Spiral
D. Agile
Answer: B
The waterfall model uses a seven-stage approach to software development and includes a feedback loop that allows development to return to the previous phase to correct defects discovered during the subsequent phase
A. Content-dependent
B. Context-dependent
C. Semantic integrity mechanisms
D. Perturbation
Answer: A
Content-dependent access control is focused on the internal data of each field.
A. Candidate key
B. Primary key
C. Foreign key
D. Super key
Answer: C
Foreign keys are used to enforce referential integrity constraints between tables that participate in a relationship.
A. Inference
B. Contamination
C. Polyinstantiation
D. Aggregation
Answer: D
In this case, the process the database user is taking advantage of is aggregation. Aggregation attacks involve the use of specialized database functions to combine information from a large number of database records to reveal information that may be more sensitive than the information in individual records would reveal.
A. Inference
B. Manipulation
C. Polyinstantiation
D. Aggregation
Answer: C
Polyinstantiation allows the insertion of multiple records that appear to have the same primary key values into a database at different classification levels.
A. Satisfy the customer through early and continuous delivery.
B. Businesspeople and developers work together.
C. Pay continuous attention to technical excellence.
D. Prioritize security over other requirements.
Answer: D
In Agile, the highest priority is to satisfy the customer through early and continuous delivery of valuable software.
A. A series of weighted layered computations
B. Combined input from a number of human experts, weighted according to past performance
C. A series of “if/then” rules codified in a knowledge base
D. A biological decision-making process that simulates the reasoning process used by the human mind
Answer: C
Expert systems use a knowledge base consisting of a series of “if/then” statements to form decisions based on the previous experience of human experts.
A. Initial
B. Repeatable
C. Defined
D. Managed
Answer: D
In the Managed phase, level 4 of the SW-CMM, the organization uses quantitative measures to gain a detailed understanding of the development process.
A. SDLC
B. ODBC
C. DSS
D. Abstraction
Answer: B
ODBC acts as a proxy between applications and the backend DBMS.
A. Static testing
B. Dynamic testing
C. Cross-site scripting testing
D. Black box testing
Answer: A
In order to conduct a static test, the tester must have access to the underlying source code.
A. Gantt
B. Venn
C. Bar
D. PERT
Answer: A
A Gantt chart is a type of bar chart that shows the interrelationships over time between projects and schedules. It provides a graphical illustration of a schedule that helps to plan, coordinate, and track specific tasks in a project.
A. Aggregation
B. Inference
C. Contamination
D. Polyinstantiation
Answer: C
Contamination is the mixing of data from a higher classification level and/or need-to-know requirement with data from a lower classification level and/or need-to-know requirement.
A. Polyinstantiation
B. Cell suppression
C. Aggregation
D. Views
Answer: A
Database developers use polyinstantiation, the creation of multiple records that seem to have the same primary key, to protect against inference attacks.
A. Request control
B. Release control
C. Configuration audit
D. Change control
Answer: C
Configuration audit is part of the configuration management process rather than the change control process.
A. Atomicity
B. Consistency
C. Isolation
D. Durability
Answer: C
The isolation principle states that two transactions operating on the same data must be temporarily separated from each other such that one does not interfere with the other.
A. Two
B. Three
C. Thirty
D. Undefined
Answer: B
The cardinality of a table refers to the number of rows in the table while the degree of a table is the number of columns.