This CISSP Prep quiz focuses on Application Security, assessing key concepts like data confidentiality, integrity, and availability. It evaluates understanding of security policies, bytecode, covert channels, and common vulnerabilities such as XSS, enhancing readiness for CISSP certification.
Identify regulatory and compliance requirements.
Educate the software development organization the impact of insecure programming.
Develop the security policy that can be enforced.
Properly test all the software that is developed by your organization for security vulnerabilities.
Rate this question:
Von Neumann
Linus’ law
Clark and Wilson
Bell–LaPadula
Rate this question:
Has increased secure inherently due to sandboxing
Manages memory operations automatically
Is more diffi cult to reverse engineer
Is faster than interpreted languages
Rate this question:
Covert channel
Denial of service
Overt channel
Object reuse
Rate this question:
Denial of service
Cross-site scripting (XSS)
Malicious file execution
Injection flaws
Rate this question:
Dumpster diving
Shoulder surfing
Phishing
Social engineering
Rate this question:
Time of check/Time of use (TOC/TOU)
Logic bomb
Remote-access trojans (RATS)
Phishing
Rate this question:
Disallow dynamic construction of queries
Bounds checking
Encode the output
Forced garbage collection
Rate this question:
Before release to production, so that the project is not delayed
If a vulnerability is detected in your software
In each stage of the life cycle
When management mandates it
Rate this question:
Preventive
Detective
Compensating
Corrective
Rate this question:
Operations personnel
Software librarian
Management
Quality assurance personnel
Rate this question:
Accreditation
Certification
Validation
Verification
Rate this question:
Computer aided software engineering (CASE)
Spiral
Waterfall
Cleanroom
Rate this question:
Sandboxing
Non-repudiation
Separation of duties
Obfuscation
Rate this question:
Worms
Trapdoor
Virus
Trojan
Rate this question:
Social engineering
Salami scam
Pranks
Hoaxes
Rate this question:
Views
Encryption
Hashing
Masking
Rate this question:
Injection and scripting
Session hijacking and cookie poisoning
Aggregation and inference
Bypassing authentication and insecure cryptography
Rate this question:
Atomicity
Consistency
Isolation
Durability
Rate this question:
Inference engine
Statistical models
Neural networks
Roles
Rate this question:
Unique and random identification
Use prepared statements and procedures
Database views
Encryption
Rate this question:
Quiz Review Timeline (Updated): Mar 20, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.