Chapter 8 Software Development Security (Domain 8)

  1. When designing an object-oriented model, which of the following situations is ideal?

    1. High cohesion, high coupling
    2. High cohesion, low coupling
    3. Low cohesion, low coupling
    4. Low cohesion, high coupling
  2. Which of the following is a common way that attackers leverage botnets?

    1. Sending spam messages
    2. Conducting brute-force attacks
    3. Scanning for vulnerable systems
    4. All of the above
  3. Which one of the following statements is not true about code review?

    1. Code review should be a peer-driven process that includes multiple developers.
    2. Code review may be automated.
    3. Code review occurs during the design phase.
    4. Code reviewers may expect to review several hundred lines of code per hour.
  4. Harold’s ...

Get CISSP Official (ISC)2 Practice Tests now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.