Certified Information Systems Security Professional – CISSP – Question287

Which of the following techniques is known to be effective in spotting resource exhaustion problems, especially with resources such as processes, memory, and connections?

A.
Automated dynamic analysis
B. Automated static analysis
C. Manual code review
D. Fuzzing

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question284

Which of the following is the MOST important security goal when performing application interface testing?

A.
Confirm that all platforms are supported and function properly
B. Evaluate whether systems or components pass data and control correctly to one another
C. Verify compatibility of software, hardware, and network connections
D. Examine error conditions related to external interfaces to prevent application details leakage

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question282

An organization plan on purchasing a custom software product developed by a small vendor to support its business model. Which unique consideration should be made part of the contractual agreement potential long-term risks associated with creating this dependency?

A.
A source code escrow clause
B. Right to request an independent review of the software source code
C. Due diligence form requesting statements of compliance with security requirements
D. Access to the technical documentation

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question280

What is the PRIMARY role of a scrum master in agile development?

A.
To choose the primary development language
B. To choose the integrated development environment
C. To match the software requirements to the delivery plan
D. To project manage the software delivery

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question279

An organization has outsourced its financial transaction processing to a Cloud Service Provider (CSP) who will provide them with Software as a Service (SaaS). If there was a data breach who is responsible for monetary losses?

A.
The Data Protection Authority (DPA)
B. The Cloud Service Provider (CSP)
C. The application developers
D. The data owner

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question278

Which of the following steps should be performed FIRST when purchasing Commercial Off-The-Shelf (COTS) software?

A.
undergo a security assessment as part of authorization process
B. establish a risk management strategy
C. harden the hosting server, and perform hosting and application vulnerability scans
D. establish policies and procedures on system and services acquisition

Correct Answer: D