Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity.
In this episode, Shon will provide CISSP training for Domain 8 (Software Development Security) of the CISSP Exam. His extensive training will cover all of the CISSP domains.
BTW - Get access to all my CISSP Training Courses here at: https://shongerber.com/
CISSP Exam Questions
Question: 125
What type of virus utilizes more than one propagation technique to maximize the number of penetrated systems?
Multipartite virus
Multipartite viruses use two or more propagation techniques (for example, file infection and boot sector infection) to maximize their reach.
From https://www.brainscape.com/flashcards/software-development-security-976024/packs/1774328
------------------------------------
Question: 126
What programming language(s) can be used to develop ActiveX controls for use on an Internet site?
All of these are correct
Microsoft's ActiveX technology supports a number of programming languages, including Visual Basic, C, C++, and Java. On the other hand, only the Java language can be used to write Java applets.
From https://www.brainscape.com/flashcards/software-development-security-976024/packs/1774328
------------------------------------
Question: 127
What transaction management principle ensures that two transactions do not interfere with each other as they operate on the same data?
Isolation
The isolation principle states that two transactions operating on the same data must be temporarily separated from each other such that one does not interfere with the other.
From https://www.brainscape.com/flashcards/software-development-security-976024/packs/1774328
------------------------------------
Want to find Shon elsewhere on the internet?
LinkedIn – www.linkedin.com/in/shongerber
Facebook - https://www.facebook.com/CyberRiskReduced/
LINKS: