【计算机类职业资格】CISSP认证考试(软件开发安全)-试卷1及答案解析.doc
《【计算机类职业资格】CISSP认证考试(软件开发安全)-试卷1及答案解析.doc》由会员分享,可在线阅读,更多相关《【计算机类职业资格】CISSP认证考试(软件开发安全)-试卷1及答案解析.doc(19页珍藏版)》请在麦多课文档分享上搜索。
1、CISSP认证考试(软件开发安全)-试卷 1及答案解析(总分:60.00,做题时间:90 分钟)1.Data marts, databases, and data warehouses have distinct characteristics. Which of the following does not correctly describe a data warehouse?(分数:2.00)A.It could increase the risk of privacy violations.B.It is developed to carry out analysis.C.It con
2、tains data from several different sources.D.It is created and used for project-based tactical reasons.2.Database software should meet the requirements of what is known as the ACID test. Why should database software carry out atomic transactions, which is one requirement of the ACID test, when OLTP i
3、s used?(分数:2.00)A.So that the rules for database integrity can be establishedB.So that the database performs transactions as a single unit without interruptionC.To ensure that rollbacks cannot take placeD.To prevent concurrent processes from interacting with each other3.Lisa has learned that most da
4、tabases implement concurrency controls. What is concurrency, and why must it be controlled?(分数:2.00)A.Processes running at different levels, which can negatively affect the integrity of the database if not properly controlled.B.The ability to deduce new information from reviewing accessible data, wh
5、ich can allow an inference attack to take place.C.Processes running simultaneously, which can negatively affect the integrity of the database if not properly controlled.D.Storing data in more than one place within a database, which can negatively affect the integrity of the database if not properly
6、controlled.4.Robert has been asked to increase the overall efficiency of the sales database by implementing a procedure that structures data to minimize duplication and inconsistencies. What procedure is this?(分数:2.00)A.PolymorphismB.NormalizationC.Implementation of database viewsD.Constructing sche
7、ma5.Which of the following correctly best describes an object-oriented database?(分数:2.00)A.When an application queries for data, it receives both the data and the procedure.B.It is structured similarly to a mesh network for redundancy and fast data retrieval.C.Subject must have knowledge of the well
8、-defined access path in order to access data.D.The relationships between data entities provide the framework for organizing data.6.Fred has been told he needs to test a component of the new content management application under development to validate its data structure, logic, and boundary condition
9、s. What type of testing should he carry out?(分数:2.00)A.Acceptance testingB.Regression testingC.Integration testingD.Unit testing7.Which of the following is the best description of a component-based system development method?(分数:2.00)A.Components periodically revisit previous stages to update and ver
10、ify design requirementsB.Minimizes the use of arbitrary transfer control statements between componentsC.Uses independent and standardized modules that are assembled into serviceable programsD.Implemented in module-based scenarios requiring rapid adaptations to changing client requirements8.There are
11、 many types of viruses that hackers can use to damage systems. Which of the following is not a correct description of a polymorphic virus?(分数:2.00)A.Intercepts antiviruss call to the operating system for file and system informationB.Varies the sequence of its instructions using noise, a mutation eng
12、ine, or random-number generatorC.Can use different encryption schemes requiring different decryption routinesD.Produces multiple, varied copies of itself9.Which of the following best describes the role of the Java Virtual Machine in the execution of Java applets?(分数:2.00)A.Converts the source code i
13、nto bytecode and blocks the sandboxB.Converts the bytecode into machine-level codeC.Operates only on specific processors within specific operating systemsD.Develops the applets, which run in a users browser10.What type of database software integrity service guarantees that tuples are uniquely identi
14、fied by primary key values?(分数:2.00)A.Concurrent integrityB.Referential integrityC.Entity integrityD.Semantic integrity11.In computer programming, cohesion and coupling are used to describe modules of code. Which of the following is a favorable combination of cohesion and coupling?(分数:2.00)A.Low coh
15、esion, low couplingB.High cohesion, high couplingC.Low cohesion, high couplingD.High cohesion, low coupling12.When an organization is unsure of the final nature of the product, what type of system development method is most appropriate for them?(分数:2.00)A.CleanroomB.Exploratory ModelC.Modified Proto
16、type MethodD.Iterative Development13.Which of the following statements does not correctly describe SOAP and Remote Procedure Calls?(分数:2.00)A.SOAP was designed to overcome the compatibility and security issues associated with Remote Procedure Calls.B.Both SOAP and Remote Procedure Calls were created
17、 to enable applicationlayer communication.C.SOAP enables the use of Remote Procedure Calls for information exchange between applications over the Internet.D.HTTP was not designed to work with Remote Procedure Calls, but SOAP was designed to work with HTTP.14.Computer programs that are based on human
18、 logic by using “if/then“ statements and inference engines are called_.(分数:2.00)A.Expert systemsB.Artificial neural networksC.Distributed Computing EnvironmentD.Enterprise JavaBeans15.Which of the following is a correct description of the pros and cons associated with third-generation programming la
19、nguages?(分数:2.00)A.The use of heuristics reduced programming effort, but the amount of manual coding for a specific task is usually more than the preceding generation.B.The use of syntax similar to human language reduced development time, but the language is resource intensive.C.The use of binary wa
20、s extremely time consuming but resulted in fewer errors.D.The use of symbols reduced programming time, but the language required knowledge of machine architecture.16.Which of the following is considered the second generation of programming languages?(分数:2.00)A.MachineB.Very high-levelC.High-levelD.A
21、ssembly17.Mary is creating malicious code that will steal a users cookies by modifying the original client-side Java script. What type of cross-site scripting vulnerability is she exploiting?(分数:2.00)A.Second orderB.DOM-basedC.PersistentD.Nonpersistent18.Of the following steps that describe the deve
22、lopment of a botnet, which best describes the step that comes first?(分数:2.00)A.Infected server sends attack commands to the botnet.B.Spammer pays a hacker for use of a botnet.C.Controller server instructs infected systems to send spam to mail servers.D.Malicious code is sent out that has bot softwar
23、e as its payload.19.Which of the following antivirus detection methods is the most recent to the industry and monitors suspicious code as it executes within the operating system?(分数:2.00)A.Behavior blockingB.Fingerprint detectionC.Signature-based detectionD.Heuristic detection20.Which of the followi
24、ng describes object-oriented programming deferred commitment?(分数:2.00)A.Autonomous objects, with cooperate through exchanges of messagesB.The internal components of an object can be refined without changing other parts of the systemC.Object-oriented analysis, design, and modeling maps to business ne
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 职业资格 CISSP 认证 考试 软件 开发 安全 试卷 答案 解析 DOC
