[计算机类试卷]CISSP认证考试(软件开发安全)模拟试卷1及答案与解析.doc
《[计算机类试卷]CISSP认证考试(软件开发安全)模拟试卷1及答案与解析.doc》由会员分享,可在线阅读,更多相关《[计算机类试卷]CISSP认证考试(软件开发安全)模拟试卷1及答案与解析.doc(34页珍藏版)》请在麦多课文档分享上搜索。
1、CISSP认证考试(软件开发安全)模拟试卷 1及答案与解析 1 Data marts, databases, and data warehouses have distinct characteristics. Which of the following does not correctly describe a data warehouse? ( A) It could increase the risk of privacy violations. ( B) It is developed to carry out analysis. ( C) It contains data from
2、 several different sources. ( D) It is created and used for project-based tactical reasons. 2 Database software should meet the requirements of what is known as the ACID test. Why should database software carry out atomic transactions, which is one requirement of the ACID test, when OLTP is used? (
3、A) So that the rules for database integrity can be established ( B) So that the database performs transactions as a single unit without interruption ( C) To ensure that rollbacks cannot take place ( D) To prevent concurrent processes from interacting with each other 3 Lisa has learned that most data
4、bases implement concurrency controls. What is concurrency, and why must it be controlled? ( A) Processes running at different levels, which can negatively affect the integrity of the database if not properly controlled. ( B) The ability to deduce new information from reviewing accessible data, which
5、 can allow an inference attack to take place. ( C) Processes running simultaneously, which can negatively affect the integrity of the database if not properly controlled. ( D) Storing data in more than one place within a database, which can negatively affect the integrity of the database if not prop
6、erly controlled. 4 Robert has been asked to increase the overall efficiency of the sales database by implementing a procedure that structures data to minimize duplication and inconsistencies. What procedure is this? ( A) Polymorphism ( B) Normalization ( C) Implementation of database views ( D) Cons
7、tructing schema 5 Which of the following correctly best describes an object-oriented database? ( A) When an application queries for data, it receives both the data and the procedure. ( B) It is structured similarly to a mesh network for redundancy and fast data retrieval. ( C) Subject must have know
8、ledge of the well-defined access path in order to access data. ( D) The relationships between data entities provide the framework for organizing data. 6 Fred has been told he needs to test a component of the new content management application under development to validate its data structure, logic,
9、and boundary conditions. What type of testing should he carry out? ( A) Acceptance testing ( B) Regression testing ( C) Integration testing ( D) Unit testing 7 Which of the following is the best description of a component-based system development method? ( A) Components periodically revisit previous
10、 stages to update and verify design requirements ( B) Minimizes the use of arbitrary transfer control statements between components ( C) Uses independent and standardized modules that are assembled into serviceable programs ( D) Implemented in module-based scenarios requiring rapid adaptations to ch
11、anging client requirements 8 There are many types of viruses that hackers can use to damage systems. Which of the following is not a correct description of a polymorphic virus? ( A) Intercepts antiviruss call to the operating system for file and system information ( B) Varies the sequence of its ins
12、tructions using noise, a mutation engine, or random-number generator ( C) Can use different encryption schemes requiring different decryption routines ( D) Produces multiple, varied copies of itself 9 Which of the following best describes the role of the Java Virtual Machine in the execution of Java
13、 applets? ( A) Converts the source code into bytecode and blocks the sandbox ( B) Converts the bytecode into machine-level code ( C) Operates only on specific processors within specific operating systems ( D) Develops the applets, which run in a users browser 10 What type of database software integr
14、ity service guarantees that tuples are uniquely identified by primary key values? ( A) Concurrent integrity ( B) Referential integrity ( C) Entity integrity ( D) Semantic integrity 11 In computer programming, cohesion and coupling are used to describe modules of code. Which of the following is a fav
15、orable combination of cohesion and coupling? ( A) Low cohesion, low coupling ( B) High cohesion, high coupling ( C) Low cohesion, high coupling ( D) High cohesion, low coupling 12 When an organization is unsure of the final nature of the product, what type of system development method is most approp
16、riate for them? ( A) Cleanroom ( B) Exploratory Model ( C) Modified Prototype Method ( D) Iterative Development 13 Which of the following statements does not correctly describe SOAP and Remote Procedure Calls? ( A) SOAP was designed to overcome the compatibility and security issues associated with R
17、emote Procedure Calls. ( B) Both SOAP and Remote Procedure Calls were created to enable applicationlayer communication. ( C) SOAP enables the use of Remote Procedure Calls for information exchange between applications over the Internet. ( D) HTTP was not designed to work with Remote Procedure Calls,
18、 but SOAP was designed to work with HTTP. 14 Computer programs that are based on human logic by using “if/then“ statements and inference engines are called_. ( A) Expert systems ( B) Artificial neural networks ( C) Distributed Computing Environment ( D) Enterprise JavaBeans 15 Which of the following
19、 is a correct description of the pros and cons associated with third-generation programming languages? ( A) The use of heuristics reduced programming effort, but the amount of manual coding for a specific task is usually more than the preceding generation. ( B) The use of syntax similar to human lan
20、guage reduced development time, but the language is resource intensive. ( C) The use of binary was extremely time consuming but resulted in fewer errors. ( D) The use of symbols reduced programming time, but the language required knowledge of machine architecture. 16 Which of the following is consid
21、ered the second generation of programming languages? ( A) Machine ( B) Very high-level ( C) High-level ( D) Assembly 17 Mary is creating malicious code that will steal a users cookies by modifying the original client-side Java script. What type of cross-site scripting vulnerability is she exploiting
22、? ( A) Second order ( B) DOM-based ( C) Persistent ( D) Nonpersistent 18 Of the following steps that describe the development of a botnet, which best describes the step that comes first? ( A) Infected server sends attack commands to the botnet. ( B) Spammer pays a hacker for use of a botnet. ( C) Co
23、ntroller server instructs infected systems to send spam to mail servers. ( D) Malicious code is sent out that has bot software as its payload. 19 Which of the following antivirus detection methods is the most recent to the industry and monitors suspicious code as it executes within the operating sys
24、tem? ( A) Behavior blocking ( B) Fingerprint detection ( C) Signature-based detection ( D) Heuristic detection 20 Which of the following describes object-oriented programming deferred commitment? ( A) Autonomous objects, with cooperate through exchanges of messages ( B) The internal components of an
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 试卷 CISSP 认证 考试 软件 开发 安全 模拟 答案 解析 DOC
