O'Reilly logo

CISSP Official (ISC)2 Practice Tests by David Seidl, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8 Software Development Security (Domain 8)

  1. When designing an object-oriented model, which of the following situations is ideal?

    1. High cohesion, high coupling
    2. High cohesion, low coupling
    3. Low cohesion, low coupling
    4. Low cohesion, high coupling
  2. Which of the following is a common way that attackers leverage botnets?

    1. Sending spam messages
    2. Conducting brute-force attacks
    3. Scanning for vulnerable systems
    4. All of the above
  3. Which one of the following statements is not true about code review?

    1. Code review should be a peer-driven process that includes multiple developers.
    2. Code review may be automated.
    3. Code review occurs during the design phase.
    4. Code reviewers may expect to review several hundred lines of code per hour.
  4. Harold’s ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required