41.
The ability of the software to restore itself to expected functionality
when the security protection that is built in is breached is also known as
- A.redundancy.
- B.recoverability.
- C.resiliency.
- D.reliability.;
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
When the software performs as it is expected to, it is said to be reliable. When errors occur, the reliability of software is impacted and the software needs to be able to restore itself to expected operations. The ability of the software to be restored to normal expected operations is referred to as recoverability. The ability of the software to withstand attacks against its reliability is referred to as resiliency. Redundancy is about availability and reconnaissance is related to information gathering as in fingerprinting/footprinting. |
42.
In which of the following software development methodologies does
unit testing enable collective code ownership and is critical to assure
software assurance?
- A.Waterfall
- B.Agile
- C.Spiral
- D.Prototyping
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Unit testing enables collective code ownership. Collective code ownership encourages everyone to contribute new ideas to all segments of the project. Any developer can change any line of code to add functionality, fix bugs, or re-factor. No one person becomes a bottleneck for changes. The way this works is for each developer that work in concert (usually more in agile methodologies than the traditional model) create unit tests for his/her code as it is developed. All code that is released into the source code repository includes unit tests. Code that is added, bugs as they are fixed, and old functionality as it is changed will be covered by automated testing. |
43.
Which of the secure design principles is promoted when test harnesses
are used?
- A.Least privilege
- B.Separation of duties
- C.Leveraging existing components
- D.Psychological acceptability
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Test harnesses promote the principle of leveraging existing components as it can be reused by multiple projects, once it is set up. |
44.
The use of IF-THEN rules is characteristic of which of the following
types of software testing?
- A.Logic
- B.Scalability
- C.Integration
- D.Unit
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
IF-THEN rules are constructs of logic and when these constructs are used for software testing, it is generally referred to as logic testing. |
45.
The implementation of secure features such as complete mediation and
data replication needs to undergo which of the following types of test
to ensure that the software meets the service level agreements (SLA)?
- A.Stress
- B.Unit
- C.Integration
- D.Regression
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Tests that assure that the service level requirements are met is characteristic of performance testing. Load and stress testing are types of performance tests. While stress testing is testing by starving the software, load testing is done by subjecting the software to extreme volumes or load. |