CleanRoom processes are incorrect because they are just one example of defect prevention methods. The CleanRoom process consists of (i) defining a set of software increments that combine to form the required system, (ii) using rigorous methods for specification, development, and certification of each increment, (iii) applying strict statistical quality control during the testing process, and (iv) enforcing a strict separation of the specification and design tasks from testing activities.
Documentation standards are incorrect because they are just one example of defect prevention methods. Standard methods can be applied to the development of requirements and design documents.
100. The scope of formal technical reviews conducted for software defect removal would
a. Configuration management specification
b. Requirements specification
c. Design specification
d. Test specification
The other three choices are incorrect because they are part of technical documents. The subject matter for formal technical reviews includes requirements specifications, detailed design, and code and test specifications. The objectives of reviewing the technical documents are to verify that (i) the work reviewed is traceable to the requirements set forth by the predecessor’s tasks, (ii) the work is complete, (iii) the work has been completed to standards, and (iv) the work is correct.
101. Patch management is a part of which of the following?
a. Directive controls
b. Preventive controls
c. Detective controls
d. Corrective controls
Directive controls are broad-based controls to handle security incidents, and they include management’s policies, procedures, and directives. Preventive controls deter security incidents from happening in the first place. Detective controls enhance security by monitoring the effectiveness of preventive controls and by detecting security incidents where preventive controls were circumvented.
102. Locking-based attacks result in which of the following?
1. Denial-of-service
2. Degradation-of-service
3. Destruction-of-service
4. Distribution-of-service
a. 1 and 2
b. 1 and 3
c. 2 and 3
d. 3 and 4
103. Which of the following protects the information confidentiality against a robust keyboard attack?
a. Disposal
b. Clearing
c. Purging
d. Destroying
The other three choices are incorrect. Disposal is the act of discarding media by giving up control in a manner short of destruction. Purging is removing obsolete data by erasure, by overwriting of storage, or by resetting registers. Destroying is ensuring that media cannot be reused as originally intended.
104. Which of the following is the correct sequence of activities involved in media sanitization?
1. Assess the risk to confidentiality.
2. Determine the future plans for the media.