CISSP 6: Software Development

CISSP 6: Software Development

Professional Development

10 Qs

quiz-placeholder

Similar activities

DevOps Desk Setup

DevOps Desk Setup

Professional Development

6 Qs

LS 3. Establishing Team & Technical Agility

LS 3. Establishing Team & Technical Agility

Professional Development

7 Qs

Dreamforce '21

Dreamforce '21

Professional Development

7 Qs

DevOps Trivia

DevOps Trivia

Professional Development

10 Qs

Devops

Devops

Professional Development

12 Qs

MAP Team Dec 2022

MAP Team Dec 2022

Professional Development

12 Qs

DevOps

DevOps

Professional Development

5 Qs

Sizing a Project

Sizing a Project

Professional Development

15 Qs

CISSP 6: Software Development

CISSP 6: Software Development

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Miguel Saavedra

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Threat modeling includes a series of steps. Which of the following is not one of those steps?

Agile

V-shaped

Waterfall

Iterative

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between source code and object code?

Source code consists of human-readable statements. Object code is the binary machine language executed by the CPU (central processing unit).

Source code expresses a program's required function. Object code is the binary machine language executed by the CPU (central processing unit).

Object code consists of human-readable statements. Source code is the binary machine language executed by the CPU (central processing unit).

Source code consists of human-readable statements. Object code expresses a program's required function.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Of these programming languages, which is considered the lowest level language?

Compiled

Assembly

Interpreted

None of the options

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Java, C++, Python, and Delphi are examples of object-oriented programming (OOP). This programming concept focuses on objects as opposed to actions. Which of the following allows methods to behave differently depending on the type of argument to which they are applied?

Inheritance

Encapsulation

Polymorphism

Polyinstantiation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between DevOps and DevSecOps?

As DevOps focuses primarily on rapid delivery of new and updated code into operational use, it relies on other processes to address security considerations. DevSecOps integrates security review and assessment into the total design, development and deployment workflow.

DevSecOps integrates security testing and assessment into the operational use of software, while DevOps performs security testing and assessment activities throughout the lifecycle.

Very little. Originally, DevOps did not explicitly consider security activities in its rapid development and release to operational use of new and modified software. Market pressure, and the creation of the competing DevSecOps model, has caused these two models to become more similar than different.

DevOps emphasizes the use of IDEs and CM tools, while DevSecOps emphasizes the use of CI and CD processes.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between continuous integration (CI) and continuous delivery (CD)?

CI requires that changes to code are frequently updated to a code repository and tested using an automated process. CD focuses on moving the changes into production.

CD requires that changes to code are frequently updated to a code repository and tested using an automated process. CI focuses on moving the changes into production.

CI is a purely manual process whereby changes to code are fed directly back into existing code without prior testing. CD focuses on quickly responding to the customer’s needs.

CD is a purely manual process whereby changes to code are fed directly back into existing code without prior testing. CI focuses on quickly responding to the customer’s needs.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Databases require lock controls to maintain the internal integrity of the data. But there is another set of requirements in a database environment. These requirements are known as the ACID test. Which of these four tests ensure transactions are invisible to other users? 

Atomicity 

Consistence 

Isolation 

Durability 

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?