RCR 081: Practice CISSP Exam Questions - CISSP Training and Study!

Published: March 11, 2020, 5 p.m.

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. 

In this episode, Shon will provide CISSP training for Domain 8 (Software Development Security) of the CISSP Exam.  His extensive training will cover all of the CISSP domains.

BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/

CISSP Exam Questions

Question:  125

What type of virus utilizes more than one propagation technique to maximize the number of penetrated systems?

  1. A) Stealth virus
  2. B) Companion virus
  3. C) Polymorphic virus
  4. D) Multipartite virus

Multipartite virus

Multipartite viruses use two or more propagation techniques (for example, file infection and boot sector infection) to maximize their reach.

From https://www.brainscape.com/flashcards/software-development-security-976024/packs/1774328


Question:  126

What programming language(s) can be used to develop ActiveX controls for use on an Internet site?

  1. A) Visual Basic
  2. B) C
  3. C) Java
  4. D) All of these are correct.

All of these are correct

Microsoft's ActiveX technology supports a number of programming languages, including Visual Basic, C, C++, and Java. On the other hand, only the Java language can be used to write Java applets.

From https://www.brainscape.com/flashcards/software-development-security-976024/packs/1774328


Question:  127

What transaction management principle ensures that two transactions do not interfere with each other as they operate on the same data?

  1. A) Atomicity
  2. B) Consistency
  3. C) Isolation
  4. D) Durability


The isolation principle states that two transactions operating on the same data must be temporarily separated from each other such that one does not interfere with the other.

From https://www.brainscape.com/flashcards/software-development-security-976024/packs/1774328


Want to find Shon elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

Facebook - https://www.facebook.com/CyberRiskReduced/