O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter review

Test your knowledge of the information in this chapter by answering these questions. The answers to these questions, and the explanations of why each answer choice is correct or incorrect, are located in the Answers section at the end of this chapter.

  1. The software escrow is intended to mitigate which of the following risks?

    1. In case the software vendor performs poorly

    2. In case the software developer goes out of business

    3. In case the original source code becomes infected or corrupted

    4. In case a transaction fails, and the system must roll back to a known good state

  2. Which of the following describes the preferred characteristics of an object in OOP?

    1. Tight COM and loose CORBA

    2. Loose acceptance testing and tight regression testing

    3. Tight methods and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required