Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity.
In this episode, Shon will provide CISSP training for Domain 8 (Software Development Security) of the CISSP Exam. His extensive training will cover all of the CISSP domains.
BTW - Get access to all my CISSP Training Courses here at: https://shongerber.com/
CISSP Exam Questions
Question: 128
In what type of software testing does the tester have access to the underlying source code?
Static testing
In order to conduct a static test, the tester must have access to the underlying source code.
From https://www.brainscape.com/flashcards/software-development-security-976024/packs/1774328
------------------------------------
Question: 129
What portion of the change management process allows developers to prioritize tasks?
Request control
The request control provides users with a framework to request changes and developers with the opportunity to prioritize those requests.
From https://www.brainscape.com/flashcards/software-development-security-976024/packs/1774328
------------------------------------
Question: 130
Which one of the following key types is used to enforce referential integrity between database tables?
Foreign key
Foreign keys are used to enforce referential integrity constraints between tables that participate in a relationship.
From https://www.brainscape.com/flashcards/software-development-security-976024/packs/1774328
------------------------------------
Want to find Shon elsewhere on the internet?
LinkedIn – www.linkedin.com/in/shongerber
Facebook - https://www.facebook.com/CyberRiskReduced/
LINKS: