O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Sample questions

Q1. Which one of the following activities is performed during the development/implementation phase of the system development life cycle?

  1. Performing security testing on particular parts of the system that are developed or acquired
  2. Auditing
  3. Sensitive assessment
  4. Monitoring

Q2. Information leakage-related issues can be addressed through:

  1. Circumvent analysis
  2. Information channel assessment
  3. Covert channel analysis
  4. Channel security process

Q3. Which of the following software development models is an iterative model? (This is a drag-and-drop type of question. Here, you can draw a line from the list of answers on the left to the empty box on the right).

Q4. Validation is used to:

  1. Establish the adherence to software specifications
  2. Fitness to the system ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required