Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CSSLP Certified Secure Software Lifecycle Professional Questions and Answers

Questions 4

Which of the following statements reflect the ' Code of Ethics Canons ' in the ' (ISC)2 Code of Ethics ' ? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Act honorably, honestly, justly, responsibly, and legally.

B.

Give guidance for resolving good versus good and bad versus bad dilemmas.

C.

Provide diligent and competent service to principals.

D.

Protect society, the commonwealth, and the infrastructure.

Buy Now
Questions 5

Which of the following security design principles supports comprehensive and simple design and implementation of protection mechanisms, so that an unintended access path does not exist or can be readily identified and eliminated?

Options:

A.

Least privilege

B.

Economy of mechanism

C.

Psychological acceptability

D.

Separation of duties

Buy Now
Questions 6

Audit trail or audit log is a chronological sequence of audit records, each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Under which of the following controls does audit control come?

Options:

A.

Reactive controls

B.

Detective controls

C.

Protective controls

D.

Preventive controls

Buy Now
Questions 7

Mark is the project manager of the NHQ project in StarTech Inc. The project has an asset valued at $195,000 and is subjected to an exposure factor of 35 percent. What will be the Single Loss Expectancy of the project?

Options:

A.

$68,250

B.

$92,600

C.

$72,650

D.

$67,250

Buy Now
Questions 8

The Data and Analysis Center for Software (DACS) specifies three general principles for software assurance which work as a framework in order to categorize various secure design principles. Which of the following principles and practices does the General Principle 1 include? Each correct answer represents a complete solution. Choose two.

Options:

A.

Principle of separation of privileges, duties, and roles

B.

Assume environment data is not trustworthy

C.

Simplify the design

D.

Principle of least privilege

Buy Now
Questions 9

Which of the following tiers addresses risks from an information system perspective?

Options:

A.

Tier 0

B.

Tier 3

C.

Tier 2

D.

Tier 1

Buy Now
Questions 10

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

Options:

A.

Spoofing

B.

Brute force attack

C.

SYN attack

D.

PING attack

Buy Now
Questions 11

Which of the following provides an easy way to programmers for writing lower-risk applications and retrofitting security into an existing application?

Options:

A.

Watermarking

B.

Code obfuscation

C.

Encryption wrapper

D.

ESAPI

Buy Now
Questions 12

Which of the following programming languages are compiled into machine code and directly executed by the CPU of a computer system? Each correct answer represents a complete solution. Choose two.

Options:

A.

C

B.

Microosft.NET

C.

Java EE

D.

C++

Buy Now
Questions 13

Which of the following individuals inspects whether the security policies, standards, guidelines, and procedures are efficiently performed in accordance with the company ' s stated security objectives?

Options:

A.

Information system security professional

B.

Data owner

C.

Senior management

D.

Information system auditor

Buy Now
Questions 14

The IAM/CA makes certification accreditation recommendations to the DAA. The DAA issues accreditation determinations. Which of the following are the accreditation determinations issued by the DAA? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

IATT

B.

IATO

C.

DATO

D.

ATO

E.

ATT

Buy Now
Questions 15

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the pre-attack phase successfully: Information gathering Determination of network range Identification of active systems Location of open ports and applications Now, which of the following tasks should he perform next?

Options:

A.

Perform OS fingerprinting on the We-are-secure network.

B.

Map the network of We-are-secure Inc.

C.

Install a backdoor to log in remotely on the We-are-secure server.

D.

Fingerprint the services running on the we-are-secure network.

Buy Now
Questions 16

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

Options:

A.

Espionage law

B.

Trademark law

C.

Cyber law

D.

Copyright law

Buy Now
Questions 17

The Phase 4 of DITSCAP C & A is known as Post Accreditation. This phase starts after the system has been accredited in Phase 3. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security operations

B.

Maintenance of the SSAA

C.

Compliance validation

D.

Change management

E.

System operations

F.

Continue to review and refine the SSAA

Buy Now
Questions 18

Which of the following DITSCAP C & A phases takes place between the signing of the initial version of the SSAA and the formal accreditation of the system?

Options:

A.

Phase 4

B.

Phase 3

C.

Phase 1

D.

Phase 2

Buy Now
Questions 19

Which of the following methods does the Java Servlet Specification v2.4 define in the HttpServletRequest interface that control programmatic security? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

getCallerIdentity()

B.

isUserInRole()

C.

getUserPrincipal()

D.

getRemoteUser()

Buy Now
Questions 20

Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?

Options:

A.

Business continuity plan development

B.

Business impact assessment

C.

Scope and plan initiation

D.

Plan approval and implementation

Buy Now
Questions 21

Which of the following technologies is used by hardware manufacturers, publishers, copyright holders and individuals to impose limitations on the usage of digital content and devices?

Options:

A.

Hypervisor

B.

Grid computing

C.

Code signing

D.

Digital rights management

Buy Now
Questions 22

Which of the following is an open source network intrusion detection system?

Options:

A.

NETSH

B.

Macof

C.

Sourcefire

D.

Snort

Buy Now
Questions 23

Which of the following techniques is used when a system performs the penetration testing with the objective of accessing unauthorized information residing inside a computer?

Options:

A.

Biometrician

B.

Van Eck Phreaking

C.

Port scanning

D.

Phreaking

Buy Now
Questions 24

In which of the following phases of the DITSCAP process does Security Test and Evaluation (ST & E) occur?

Options:

A.

Phase 2

B.

Phase 4

C.

Phase 3

D.

Phase 1

Buy Now
Questions 25

You work as a Security Manager for Tech Perfect Inc. The company has a Windows based network. It is required to determine compatibility of the systems with custom applications. Which of the following techniques will you use to accomplish the task?

Options:

A.

Safe software storage

B.

Antivirus management

C.

Backup control

D.

Software testing

Buy Now
Questions 26

Which of the following is used by attackers to record everything a person types, including usernames, passwords, and account information?

Options:

A.

Packet sniffing

B.

Keystroke logging

C.

Spoofing

D.

Wiretapping

Buy Now
Questions 27

NIST SP 800-53A defines three types of interview depending on the level of assessment conducted. Which of the following NIST SP 800-53A interviews consists of informal and ad hoc interviews?

Options:

A.

Comprehensive

B.

Significant

C.

Abbreviated

D.

Substantial

Buy Now
Questions 28

Which of the following access control models uses a predefined set of access privileges for an object of a system?

Options:

A.

Role-Based Access Control

B.

Discretionary Access Control

C.

Policy Access Control

D.

Mandatory Access Control

Buy Now
Questions 29

Continuous Monitoring is the fourth phase of the security certification and accreditation process. What activities are performed in the Continuous Monitoring process? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security accreditation decision

B.

Security control monitoring and impact analyses of changes to the information system

C.

Security accreditation documentation

D.

Configuration management and control

E.

Status reporting and documentation

Buy Now
Questions 30

Martha works as a Project Leader for BlueWell Inc. She and her team have developed accounting software. The software was performing well. Recently, the software has been modified. The users of this software are now complaining about the software not working properly. Which of the following actions will she take to test the software?

Options:

A.

Perform integration testing

B.

Perform regression testing

C.

Perform unit testing

D.

Perform acceptance testing

Buy Now
Questions 31

Stella works as a system engineer for BlueWell Inc. She wants to identify the performance thresholds of each build. Which of the following tests will help Stella to achieve her task?

Options:

A.

Reliability test

B.

Performance test

C.

Regression test

D.

Functional test

Buy Now
Questions 32

Which of the following agencies is responsible for funding the development of many technologies such as computer networking, as well as NLS?

Options:

A.

DIAP

B.

DTIC

C.

DARPA

D.

DISA

Buy Now
Questions 33

Drag and drop the correct DoD Policy Series at their appropriate places.

CSSLP Question 33

Options:

Buy Now
Questions 34

DIACAP applies to the acquisition, operation, and sustainment of any DoD system that collects, stores, transmits, or processes unclassified or classified information since December 1997. What phases are identified by DIACAP? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

System Definition

B.

Validation

C.

Identification

D.

Accreditation

E.

Verification

F.

Re-Accreditation

Buy Now
Questions 35

Which of the following are the principle duties performed by the BIOS during POST (power-on-self-test)? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

It provides a user interface for system ' s configuration.

B.

It identifies, organizes, and selects boot devices.

C.

It delegates control to other BIOS, if it is required.

D.

It discovers size and verifies system memory.

E.

It verifies the integrity of the BIOS code itself.

F.

It interrupts the execution of all running programs.

Buy Now
Questions 36

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Sensitive

B.

Private

C.

Unclassified

D.

Confidential

E.

Secret

F.

Public

Buy Now
Questions 37

Which of the following are the scanning methods used in penetration testing? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Vulnerability

B.

Port

C.

Services

D.

Network

Buy Now
Questions 38

Which of the following security models dictates that subjects can only access objects through applications?

Options:

A.

Biba model

B.

Bell-LaPadula

C.

Clark-Wilson

D.

Biba-Clark model

Buy Now
Questions 39

Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Kernel flaws

B.

Information system architectures

C.

Race conditions

D.

File and directory permissions

E.

Buffer overflows

F.

Trojan horses

G.

Social engineering

Buy Now
Questions 40

Drag and drop the appropriate principle documents in front of their respective functions.

CSSLP Question 40

Options:

Buy Now
Questions 41

In which of the following deployment models of cloud is the cloud infrastructure operated exclusively for an organization?

Options:

A.

Public cloud

B.

Community cloud

C.

Private cloud

D.

Hybrid cloud

Buy Now
Questions 42

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

Options:

A.

Cold site

B.

Off site

C.

Warm site

D.

Hot site

Buy Now
Questions 43

The DoD 8500 policy series represents the Department ' s information assurance strategy. Which of the following objectives are defined by the DoD 8500 series? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Defending systems

B.

Providing IA Certification and Accreditation

C.

Providing command and control and situational awareness

D.

Protecting information

Buy Now
Questions 44

Which of the following are included in Technical Controls? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Identification and authentication methods

B.

Configuration of the infrastructure

C.

Password and resource management

D.

Implementing and maintaining access control mechanisms

E.

Security devices

F.

Conducting security-awareness training

Buy Now
Questions 45

Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information assurance and the security posture of a system or site?

Options:

A.

NSA-IAM

B.

NIACAP

C.

ASSET

D.

DITSCAP

Buy Now
Questions 46

The Software Configuration Management (SCM) process defines the need to trace changes, and the ability to verify that the final delivered software has all of the planned enhancements that are supposed to be included in the release. What are the procedures that must be defined for each software project to ensure that a sound SCM process is implemented? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Configuration status accounting

B.

Configuration change control

C.

Configuration identification

D.

Configuration audits

E.

Configuration implementation

F.

Configuration deployment

Buy Now
Questions 47

The build environment of secure coding consists of some tools that actively support secure specification, design, and implementation. Which of the following features do these tools have? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

They decrease the exploitable flaws and weaknesses.

B.

They reduce and restrain the propagation, extent, and damage that have occurred by insecure software behavior.

C.

They decrease the attack surface.

D.

They employ software security constraints, protections, and services. E. They decrease the level of type checking and program analysis.

Buy Now
Questions 48

Drag and drop the appropriate external constructs in front of their respective functions.

CSSLP Question 48

Options:

Buy Now
Questions 49

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Change and Configuration Control

B.

Security Certification and Accreditation (C & A)

C.

Vulnerability Assessment and Penetration Testing

D.

Risk Adjustments

Buy Now
Questions 50

Which of the following is a variant with regard to Configuration Management?

Options:

A.

A CI that has the same name as another CI but shares no relationship.

B.

A CI that particularly refers to a software version.

C.

A CI that has the same essential functionality as another CI but a bit different in some small manner.

D.

A CI that particularly refers to a hardware specification.

Buy Now
Questions 51

In which of the following processes are experienced personnel and software tools used to investigate, resolve, and handle process deviation, malformed data, infrastructure, or connectivity issues?

Options:

A.

Risk Management

B.

Exception management

C.

Configuration Management

D.

Change Management

Buy Now
Questions 52

Which of the following methods determines the principle name of the current user and returns the jav a.security.Principal object in the HttpServletRequest interface?

Options:

A.

getUserPrincipal()

B.

isUserInRole()

C.

getRemoteUser()

D.

getCallerPrincipal()

Buy Now
Questions 53

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

Options:

A.

RTO

B.

RTA

C.

RPO

D.

RCO

Buy Now
Questions 54

You work as a Security Manager for Tech Perfect Inc. You have set up a SIEM server for the following purposes: Analyze the data from different log sources Correlate the events among the log entries Identify and prioritize significant events Initiate responses to events if required One of your log monitoring staff wants to know the features of SIEM product that will help them in these purposes. What features will you recommend? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Asset information storage and correlation

B.

Transmission confidentiality protection

C.

Incident tracking and reporting

D.

Security knowledge base

E.

Graphical user interface

Buy Now
Questions 55

Which of the following statements is true about residual risks?

Options:

A.

It is the probabilistic risk after implementing all security measures.

B.

It can be considered as an indicator of threats coupled with vulnerability.

C.

It is a weakness or lack of safeguard that can be exploited by a threat.

D.

It is the probabilistic risk before implementing all security measures.

Buy Now
Questions 56

Which of the following is a signature-based intrusion detection system (IDS) ?

Options:

A.

RealSecure

B.

StealthWatch

C.

Tripwire

D.

Snort

Buy Now
Questions 57

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. Which of the following participants are required in a NIACAP security assessment? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Certification agent

B.

Designated Approving Authority

C.

IS program manager

D.

Information Assurance Manager

E.

User representative

Buy Now
Questions 58

You work as the senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?

Options:

A.

Configuration status accounting

B.

Configuration identification

C.

Configuration auditing

D.

Configuration control

Buy Now
Questions 59

Which of the following attacks causes software to fail and prevents the intended users from accessing software?

Options:

A.

Enabling attack

B.

Reconnaissance attack

C.

Sabotage attack

D.

Disclosure attack

Buy Now
Questions 60

There are seven risks responses that a project manager can choose from. Which risk response is appropriate for both positive and negative risk events?

Options:

A.

Acceptance

B.

Transference

C.

Sharing

D.

Mitigation

Buy Now
Questions 61

Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?

Options:

A.

The custodian makes the initial information classification assignments, and the operations manager implements the scheme.

B.

The data owner implements the information classification scheme after the initial assignment by the custodian.

C.

The custodian implements the information classification scheme after the initial assignment by the operations manager.

D.

The data custodian implements the information classification scheme after the initial assignment by the data owner.

Buy Now
Questions 62

Which of the following is an example of over-the-air (OTA) provisioning in digital rights management?

Options:

A.

Use of shared secrets to initiate or rebuild trust.

B.

Use of software to meet the deployment goals.

C.

Use of concealment to avoid tampering attacks.

D.

Use of device properties for unique identification.

Buy Now
Questions 63

You work as a project manager for a company. The company has started a new security software project. The software configuration management will be used throughout the lifecycle of the project. You are tasked to modify the functional features and the basic logic of the software and then make them compatible to the initial design of the project. Which of the following procedures of the configuration management will you follow to accomplish the task?

Options:

A.

Configuration status accounting

B.

Configuration control

C.

Configuration audits

D.

Configuration identification

Buy Now
Questions 64

Which of the following secure coding principles and practices defines the appearance of code listing so that a code reviewer and maintainer who have not written that code can easily understand it?

Options:

A.

Make code forward and backward traceable

B.

Review code during and after coding

C.

Use a consistent coding style

D.

Keep code simple and small

Buy Now
Questions 65

Which of the following are examples of the application programming interface (API)? Each correct answer represents a complete solution. Choose three.

Options:

A.

HTML

B.

PHP

C.

.NET

D.

Perl

Buy Now
Questions 66

Which of the following types of redundancy prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data?

Options:

A.

Data redundancy

B.

Hardware redundancy

C.

Process redundancy

D.

Application redundancy

Buy Now
Questions 67

Which of the following life cycle modeling activities establishes service relationships and message exchange paths?

Options:

A.

Service-oriented logical design modeling

B.

Service-oriented conceptual architecture modeling

C.

Service-oriented discovery and analysis modeling

D.

Service-oriented business integration modeling

Buy Now
Questions 68

Which of the following is a name, symbol, or slogan with which a product is identified?

Options:

A.

Trademark

B.

Copyright

C.

Trade secret

D.

Patent

Buy Now
Questions 69

Which of the following statements about the availability concept of Information security management is true?

Options:

A.

It ensures that modifications are not made to data by unauthorized personnel or processes.

B.

It determines actions and behaviors of a single individual within a system.

C.

It ensures reliable and timely access to resources.

D.

It ensures that unauthorized modifications are not made to data by authorized personnel or processes.

Buy Now
Questions 70

The organization level is the Tier 1 and it addresses risks from an organizational perspective. What are the various Tier 1 activities? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The organization plans to use the degree and type of oversight, to ensure that the risk management strategy is being effectively carried out.

B.

The level of risk tolerance.

C.

The techniques and methodologies an organization plans to employ, to evaluate information system-related security risks.

D.

The RMF primarily operates at Tier 1.

Buy Now
Questions 71

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

Options:

A.

Quantitative risk analysis

B.

Qualitative risk analysis

C.

Seven risk responses

D.

A risk probability-impact matrix

Buy Now
Questions 72

The Phase 1 of DITSCAP C & A is known as Definition Phase. The goal of this phase is to define the C & A level of effort, identify the main C & A roles and responsibilities, and create an agreement on the method for implementing the security requirements. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Negotiation

B.

Registration

C.

Document mission need

D.

Initial Certification Analysis

Buy Now
Questions 73

Certification and Accreditation (C & A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation? Each correct answer represents a complete solution. Choose two.

Options:

A.

Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.

B.

Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.

C.

Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.

D.

Certification is the official management decision given by a senior agency official to authorize operation of an information system.

Buy Now
Questions 74

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?

Options:

A.

Cold Site

B.

Hot Site

C.

Warm Site

D.

Mobile Site

Buy Now
Questions 75

Della works as a security engineer for BlueWell Inc. She wants to establish configuration management and control procedures that will document proposed or actual changes to the information system. Which of the following phases of NIST SP 800-37 C & A methodology will define the above task?

Options:

A.

Initiation

B.

Security Certification

C.

Continuous Monitoring

D.

Security Accreditation

Buy Now
Questions 76

Which of the following coding practices are helpful in simplifying code? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Programmers should use multiple small and simple functions rather than a single complex function.

B.

Software should avoid ambiguities and hidden assumptions, recursions, and GoTo statements. C. Programmers should implement high-consequence functions in minimum required lines of code and follow proper coding standards.

C.

Processes should have multiple entry and exit points.

Buy Now
Questions 77

What are the subordinate tasks of the Initiate and Plan IA C & A phase of the DIACAP process? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Initiate IA implementation plan

B.

Develop DIACAP strategy

C.

Assign IA controls.

D.

Assemble DIACAP team

E.

Register system with DoD Component IA Program.

F.

Conduct validation activity.

Buy Now
Questions 78

Which of the following processes will you involve to perform the active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures?

Options:

A.

Penetration testing

B.

Baselining

C.

Risk analysis

D.

Compliance checking

Buy Now
Questions 79

The rights of an author or a corporation to make profit from the creation of their products (such as software, music, etc.) are protected by the Intellectual Property law. Which of the following are the components of the Intellectual Property law? Each correct answer represents a part of the solution. Choose two.

Options:

A.

Trademark law

B.

Industrial Property law

C.

Copyright law

D.

Patent law

Buy Now
Questions 80

What NIACAP certification levels are recommended by the certifier? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Comprehensive Analysis

B.

Maximum Analysis

C.

Detailed Analysis

D.

Minimum Analysis

E.

Basic Security Review

F.

Basic System Review

Buy Now
Questions 81

You work as a security manager for BlueWell Inc. You are performing the external vulnerability testing, or penetration testing to get a better snapshot of your organization ' s security posture. Which of the following penetration testing techniques will you use for searching paper disposal areas for unshredded or otherwise improperly disposed-of reports?

Options:

A.

Sniffing

B.

Scanning and probing

C.

Dumpster diving

D.

Demon dialing

Buy Now
Questions 82

Which of the following documents is defined as a source document, which is most useful for the ISSE when classifying the needed security functionality?

Options:

A.

Information Protection Policy (IPP)

B.

IMM

C.

System Security Context

D.

CONOPS

Buy Now
Questions 83

Security Test and Evaluation (ST & E) is a component of risk assessment. It is useful in discovering system vulnerabilities. For what purposes is ST & E used? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To implement the design of system architecture

B.

To determine the adequacy of security mechanisms, assurances, and other properties to enforce the security policy

C.

To assess the degree of consistency between the system documentation and its implementation

D.

To uncover design, implementation, and operational flaws that may allow the violation of security policy

Buy Now
Questions 84

In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?

Options:

A.

Design

B.

Evaluation and acceptance

C.

Programming and training

D.

Initiation

Buy Now
Questions 85

In which of the following testing methods is the test engineer equipped with the knowledge of system and designs test cases or test data based on system knowledge?

Options:

A.

Integration testing

B.

Regression testing

C.

Whitebox testing

D.

Graybox testing

Buy Now
Questions 86

You are responsible for network and information security at a metropolitan police station. The most important concern is that unauthorized parties are not able to access data. What is this called?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Encryption

Buy Now
Questions 87

You work as a system engineer for BlueWell Inc. You want to verify that the build meets its data requirements, and correctly generates each expected display and report. Which of the following tests will help you to perform the above task?

Options:

A.

Performance test

B.

Functional test

C.

Reliability test

D.

Regression test

Buy Now
Questions 88

Certification and Accreditation (C & A or CnA) is a process for implementing information security. Which of the following is the correct order of C & A phases in a DITSCAP assessment?

Options:

A.

Verification, Definition, Validation, and Post Accreditation

B.

Definition, Validation, Verification, and Post Accreditation

C.

Definition, Verification, Validation, and Post Accreditation

D.

Verification, Validation, Definition, and Post Accreditation

Buy Now
Questions 89

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

Options:

A.

Copyright

B.

Utility model

C.

Trade secret

D.

Cookie

Buy Now
Questions 90

The mission and business process level is the Tier 2. What are the various Tier 2 activities? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Developing an organization-wide information protection strategy and incorporating high-level information security requirements

B.

Defining the types of information that the organization needs, to successfully execute the stated missions and business processes

C.

Specifying the degree of autonomy for the subordinate organizations

D.

Defining the core missions and business processes for the organization

E.

Prioritizing missions and business processes with respect to the goals and objectives of the organization

Buy Now
Questions 91

Information Security management is a process of defining the security controls in order to protect information assets. The first action of a management program to implement information security is to have a security program in place. What are the objectives of a security program? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security education

B.

Security organization

C.

System classification

D.

Information classification

Buy Now
Questions 92

Which of the following processes does the decomposition and definition sequence of the Vee model include? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Component integration and test

B.

System security analysis

C.

Security requirements allocation

D.

High level software design

Buy Now
Questions 93

Henry is the project manager of the QBG Project for his company. This project has a budget of $4,576,900 and is expected to last 18 months to complete. The CIO, a stakeholder in the project, has introduced a scope change request for additional deliverables as part of the project work. What component of the change control system would review the proposed changes ' impact on the features and functions of the project ' s product?

Options:

A.

Configuration management system

B.

Scope change control system

C.

Cost change control system

D.

Integrated change control

Buy Now
Questions 94

Elizabeth is a project manager for her organization and she finds risk management to be very difficult for her to manage. She asks you, a lead project manager, at what stage in the project will risk management become easier. What answer best resolves the difficulty of risk management practices and the effort required?

Options:

A.

Risk management only becomes easier when the project moves into project execution.

B.

Risk management only becomes easier when the project is closed.

C.

Risk management is an iterative process and never becomes easier.

D.

Risk management only becomes easier the more often it is practiced.

Buy Now
Questions 95

You work as a project manager for BlueWell Inc. You are preparing to plan risk responses for your project with your team. How many risk response types are available for a negative risk event in the project?

Options:

A.

Three

B.

Seven

C.

One

D.

Four

Buy Now
Questions 96

Which of the following elements sets up a requirement to receive the constrained requests over a protected layer connection, such as TLS (Transport Layer Security)?

Options:

A.

User data constraint

B.

Authorization constraint

C.

Web resource collection

D.

Accounting constraint

Buy Now
Questions 97

A part of a project deals with the hardware work. As a project manager, you have decided to hire a company to deal with all hardware work on the project. Which type of risk response is this?

Options:

A.

Exploit

B.

Mitigation

C.

Transference

D.

Avoidance

Buy Now
Questions 98

A number of security patterns for Web applications under the DARPA contract have been developed by Kienzle, Elder, Tyree, and Edwards-Hewitt. Which of the following patterns are applicable to aspects of authentication in Web applications?b Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Authenticated session

B.

Secure assertion

C.

Partitioned application

D.

Password authentication

E.

Account lockout

F.

Password propagation

Buy Now
Questions 99

FIPS 199 defines the three levels of potential impact on organizations: low, moderate, and high. Which of the following are the effects of loss of confidentiality, integrity, or availability in a high level potential impact?

Options:

A.

The loss of confidentiality, integrity, or availability might result in a major damage to organizational assets.

B.

The loss of confidentiality, integrity, or availability might result in severe damages like life threatening injuries or loss of life.

C.

The loss of confidentiality, integrity, or availability might result in major financial losses.

D.

The loss of confidentiality, integrity, or availability might cause severe degradation in or loss of mission capability to an extent.

Buy Now
Questions 100

Which of the following can be used to accomplish authentication? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Encryption

B.

Biometrics

C.

Token

D.

Password

Buy Now
Questions 101

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the pre-attack phase to check the security of the We-are-secure network: Gathering information Determining the network range Identifying active systems Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

Options:

A.

ARIN

B.

APNIC

C.

RIPE

D.

SuperScan

Buy Now
Questions 102

Which of the following is an attack with IP fragments that cannot be reassembled?

Options:

A.

Password guessing attack

B.

Teardrop attack

C.

Dictionary attack

D.

Smurf attack

Buy Now
Questions 103

The DARPA paper defines various procedural patterns to perform secure system development practices. Which of the following patterns does it include? Each correct answer represents a complete solution. Choose three.

Options:

A.

Hidden implementation

B.

Document the server configuration

C.

Patch proactively

D.

Red team the design

E.

Password propagation

Buy Now
Questions 104

Which of the following are the tasks performed by the owner in the information classification schemes? Each correct answer represents a part of the solution. Choose three.

Options:

A.

To make original determination to decide what level of classification the information requires, which is based on the business requirements for the safety of the data.

B.

To review the classification assignments from time to time and make alterations as the business requirements alter.

C.

To perform data restoration from the backups whenever required.

D.

To delegate the responsibility of the data safeguard duties to the custodian.

Buy Now
Exam Code: CSSLP
Exam Name: Certified Secure Software Lifecycle Professional
Last Update: Apr 30, 2026
Questions: 349

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now CSSLP testing engine

PDF (Q&A)

$43.57  $124.49
buy now CSSLP pdf