RCR 081: Practice CISSP Exam Questions - CISSP Training and Study!

Mar 04, 2020

 

Subscribe: iTunes | Goggle Play | Stitcher Radio | RSS 

Description: 

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity.   

In this episode, Shon will provide CISSP training for Domain 8 (Software Development Security) of the CISSP Exam.  His extensive training will cover all of the CISSP domains. 

BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/ 

CISSP Exam Questions 

Question:  125 

What type of virus utilizes more than one propagation technique to maximize the number of penetrated systems? 

  1. A) Stealth virus
  2. B) Companion virus
  3. C) Polymorphic virus
  4. D) Multipartite virus 

Multipartite virus 

Multipartite viruses use two or more propagation techniques (for example, file infection and boot sector infection) to maximize their reach.  

From <https://www.brainscape.com/flashcards/software-development-security-976024/packs/1774328>  

------------------------------------ 

Question:  126 

What programming language(s) can be used to develop ActiveX controls for use on an Internet site? 

  1. A) Visual Basic
  2. B) C
  3. C) Java
  4. D) All of these are correct. 

All of these are correct 

Microsoft's ActiveX technology supports a number of programming languages, including Visual Basic, C, C++, and Java. On the other hand, only the Java language can be used to write Java applets.  

From <https://www.brainscape.com/flashcards/software-development-security-976024/packs/1774328> 

------------------------------------ 

Question:  127 

What transaction management principle ensures that two transactions do not interfere with each other as they operate on the same data? 

  1. A) Atomicity
  2. B) Consistency
  3. C) Isolation
  4. D) Durability 

Isolation 

The isolation principle states that two transactions operating on the same data must be temporarily separated from each other such that one does not interfere with the other.  

From <https://www.brainscape.com/flashcards/software-development-security-976024/packs/1774328> 

------------------------------------ 

Want to find Shon elsewhere on the internet? 

LinkedIn – www.linkedin.com/in/shongerber 

Facebook - https://www.facebook.com/CyberRiskReduced/ 

LINKS:  

TRANSCRIPT:

Welcome to reduce cyber risk podcast episode 81 cissp exam questions domain at 8 welcome to reduce cyber risk podcast where we provide you the training and tools you need to pass the cissp exam while enhancing your cybersecurity career hi my name is Sean Gerber and I'm your host of this action-packed informative podcast join me each week cuz I provide the information you need to grow your knowledge so that you're better prepared to pass the cissp exam why good morning everybody hope everybody's doing well this beautiful day depends on when you're downloading isn't listening to it could be afternoon could be evening but that's what I make is at 4 in the morning I had this is when these podcasts are recorded So it's a morning for me hope everybody's doing good and everybody's doing well this week is so again life is good here in the great state of Kansas cannot complain at all so today this is the following for our domain 8 that we did the podcast on Monday and you'll be getting these of software development security for the cissp exam questions and as you're studying for the cissp and you are cramming for that these this the ultimate goal of this podcast is to provide you some guidance around what you should study for for the cissp exam answer them but they're going to give you a frame of reference when you get the exam on how to answer the question specifically. I need that again if you find anybody tells you I've got the free cheat the free cheat questions that you can use don't believe them that that you can't it's just the girl to Michael of the exam questions as to help guide you and what you how you should properly answer the cissp exam so first question what type of virus utilizes more than one propagation Tech maximize the number of penetrated systems alright so what type of virus utilizes more all right what type of virus utilizes more than one propagation technique to maximize the number of penetrated systems okay the question is again what type of virus utilizes more than one propagation technique the number of penetrated systems stealth virus B companion virus C polymorphic virus d multipartite virus and the answer is multipartite virus multipartite multi partite multipartite probably just butchered that is as two or more propagation techniques for example the infection and the boot sector infection to maximize their reach so basically it's got multiple virus issues with it and it's designed to just be able to get into and make havoc on your environment let's multipartite virus has at least this question comes from brainscape and you got the link will be so you can go ahead and go what programming language can be used to develop ActiveX for the use in or on an internet fight what programming language can be used to develop ActiveX controls for use on an Internet site Visual Basic BBC C Java D all of the above are correct programming languages can be used to develop ActiveX Extant for use on an Internet site a Visual Basic b c language the C language see Jabba the all of the above and the answer is all the above d a Microsoft ActiveX technology supports and number of programming languages including Visual Basic sharp C+ and on Java that's that's coming important piece of that and the other hand though only Java language can be used to write Java Java applets so bottom line on that is ActiveX is very flexible question what transaction management principle ensures that two transactions do not interfere with each other as they operate on the same data transaction management principle ensures that two transactions do not interfere with each other or as or as they operate on the same data Atomic Atomic density Atomic density a t o m i c i t y City struggle with ten-dollar words consistency operate on the same data can't do not interfere focus on the word Atria's isolation see the isolation principle states that two transactions operate on the same day that must be temporarily separated from each other such as that one does not interfere with the other you have two parts these words out I know it's a fast test and you got to go through it pretty quickly but you need to be able to look for keywords to help you with this test I have for today go to Sean Gerber again I got free ciso training is available only only only to my podcast listeners go to Sean gerber.com and look for csoc ISO training it's going to be $150 once it's done you get the introduction you get to go there right now and get it for free again though it's a little rough it out but once it gets completely finished it is shut off to everybody and it'll be a paid product so you need to go there and get your free gift now everybody will get jealous see ya thanks so much for joining me today on my podcast head over to Shawn gerber.com and look at all the free content that I have available for you there is a cissp mini course free cissp exam questions podcast and so much more it's all available to my email subscriber so sign up if you want my personalized cissp training play with your cissp need so you can pass the test the first time thanks so much for listening will catch you on the flip side CPI

Stay connected with news and updates!

Join our mailing list to receive the latest news and updates from our team. You'r information will not be shared.

Close

Don't you want to pass the CISSP....the FIRST time?

Get my FREE CISSP training videos (Domains 1 - 4) so I can show you how to pass the CISSP Exam...the FIRST time! .