Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

CSSLP Certified Secure Software Lifecycle Professional Questions and Answers

Questions 4

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

Options:

A.

Evasion attack

B.

Fragmentation overlap attack

C.

Fragmentation overwrite attack

D.

Insertion attack

Buy Now
Questions 5

Which of the following security models focuses on data confidentiality and controlled access to classified information?

Options:

A.

Clark-Wilson model

B.

Biba model

C.

Take-Grant model

D.

Bell-La Padula model

Buy Now
Questions 6

The build environment of secure coding consists of some tools that actively support secure specification, design, and implementation. Which of the following features do these tools have? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

They decrease the exploitable flaws and weaknesses.

B.

They reduce and restrain the propagation, extent, and damage that have occurred by insecure software behavior.

C.

They decrease the attack surface.

D.

They employ software security constraints, protections, and services. E. They decrease the level of type checking and program analysis.

Buy Now
Questions 7

Digital rights management (DRM) consists of compliance and robustness rules. Which of the following features does the robustness rule have? Each correct answer represents a complete solution. Choose three.

Options:

A.

It specifies the various levels of robustness that are needed for asset security.

B.

It specifies minimum techniques for asset security.

C.

It specifies the behaviors of the DRM implementation and applications accessing the implementation.

D.

It contains assets, such as device key, content key, algorithm, and profiling data.

Buy Now
Questions 8

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Options:

A.

Single Loss Expectancy (SLE)

B.

Annualized Rate of Occurrence (ARO)

C.

Safeguard

D.

Exposure Factor (EF)

Buy Now
Questions 9

Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?

Options:

A.

Contingency plan

B.

Business continuity plan

C.

Crisis communication plan

D.

Disaster recovery plan

Buy Now
Questions 10

Which of the following access control models uses a predefined set of access privileges for an object of a system?

Options:

A.

Role-Based Access Control

B.

Discretionary Access Control

C.

Policy Access Control

D.

Mandatory Access Control

Buy Now
Questions 11

Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.

Options:

A.

Password policies

B.

Data classification

C.

Data encryption

D.

Vulnerability assessments

Buy Now
Questions 12

Fill in the blank with the appropriate security mechanism. is a computer hardware mechanism or programming language construct which handles the occurrence of exceptional events.

Options:

A.

Exception handling

Buy Now
Questions 13

In which of the following architecture styles does a device receive input from connectors and generate transformed outputs?

Options:

A.

N-tiered

B.

Heterogeneous

C.

Pipes and filters

D.

Layered

Buy Now
Questions 14

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Sensitive

B.

Private

C.

Unclassified

D.

Confidential

E.

Secret

F.

Public

Buy Now
Questions 15

In which of the following DIACAP phases is residual risk analyzed?

Options:

A.

Phase 1

B.

Phase 5

C.

Phase 2

D.

Phase 4

E.

Phase 3

Buy Now
Questions 16

Fill in the blank with an appropriate phrase. is used to provide security mechanisms for the storage, processing, and transfer of data.

Options:

A.

Data classification

Buy Now
Questions 17

What are the subordinate tasks of the Implement and Validate Assigned IA Control phase in the DIACAP process? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Conduct validation activities.

B.

Execute and update IA implementation plan.

C.

Combine validation results in DIACAP scorecard.

D.

Conduct activities related to the disposition of the system data and objects.

Buy Now
Questions 18

Which of the following is an open source network intrusion detection system?

Options:

A.

NETSH

B.

Macof

C.

Sourcefire

D.

Snort

Buy Now
Questions 19

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

Options:

A.

Continuity of Operations Plan

B.

Contingency Plan

C.

Disaster Recovery Plan

D.

Business Continuity Plan

Buy Now
Questions 20

Which of the following persons in an organization is responsible for rejecting or accepting the residual risk for a system?

Options:

A.

Information Systems Security Officer (ISSO)

B.

Designated Approving Authority (DAA)

C.

System Owner

D.

Chief Information Security Officer (CISO)

Buy Now
Questions 21

Which of the following NIST Special Publication documents provides a guideline on questionnaires and checklists through which systems can be evaluated for compliance against specific control objectives?

Options:

A.

NIST SP 800-37

B.

NIST SP 800-26

C.

NIST SP 800-53A

D.

NIST SP 800-59

E.

NIST SP 800-53

F.

NIST SP 800-60

Buy Now
Questions 22

Which of the following configuration management system processes keeps track of the changes so that the latest acceptable configuration specifications are readily available?

Options:

A.

Configuration Control

B.

Configuration Status and Accounting

C.

Configuration Verification and Audit

D.

Configuration Identification

Buy Now
Questions 23

Gary is the project manager for his project. He and the project team have completed the qualitative risk analysis process and are about to enter the quantitative risk analysis process when Mary, the project sponsor, wants to know what quantitative risk analysis will review. Which of the following statements best defines what quantitative risk analysis will review?

Options:

A.

The quantitative risk analysis process will analyze the effect of risk events that may substantially impact the project's competing demands.

B.

The quantitative risk analysis reviews the results of risk identification and prepares the project for risk response management.

C.

The quantitative risk analysis seeks to determine the true cost of each identified risk event and the probability of each risk event to determine the risk exposure.

D.

The quantitative risk analysis process will review risk events for their probability and impact on the project objectives.

Buy Now
Questions 24

Samantha works as an Ethical Hacker for we-are-secure Inc. She wants to test the security of the we-are-secure server for DoS attacks. She sends large number of ICMP ECHO packets to the target computer. Which of the following DoS attacking techniques will she use to accomplish the task?

Options:

A.

Smurf dos attack

B.

Land attack

C.

Ping flood attack

D.

Teardrop attack

Buy Now
Questions 25

Who amongst the following makes the final accreditation decision?

Options:

A.

ISSE

B.

CRO

C.

DAA

D.

ISSO

Buy Now
Questions 26

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

Options:

A.

Structured walk-through test

B.

Full-interruption test

C.

Parallel test

D.

Simulation test

Buy Now
Questions 27

Which of the following ISO standards is entitled as "Information technology - Security techniques - Information security management - Measurement"?

Options:

A.

ISO 27003

B.

ISO 27005

C.

ISO 27004

D.

ISO 27006

Buy Now
Questions 28

Which of the following terms refers to the protection of data against unauthorized access?

Options:

A.

Integrity

B.

Recovery

C.

Auditing

D.

Confidentiality

Buy Now
Questions 29

Which of the following approaches can be used to build a security program? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Right-Up Approach

B.

Left-Up Approach

C.

Top-Down Approach

D.

Bottom-Up Approach

Buy Now
Questions 30

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?

Options:

A.

Discretionary Access Control

B.

Mandatory Access Control

C.

Policy Access Control

D.

Role-Based Access Control

Buy Now
Questions 31

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. What are the different types of NIACAP accreditation? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Site accreditation

B.

Type accreditation

C.

Secure accreditation

D.

System accreditation

Buy Now
Questions 32

A service provider guarantees for end-to-end network traffic performance to a customer. Which of the following types of agreement is this?

Options:

A.

SLA

B.

VPN

C.

NDA

D.

LA

Buy Now
Questions 33

Which of the following documents were developed by NIST for conducting Certification & Accreditation (C&A)? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NIST Special Publication 800-60

B.

NIST Special Publication 800-53

C.

NIST Special Publication 800-37A

D.

NIST Special Publication 800-59

E.

NIST Special Publication 800-37

F.

NIST Special Publication 800-53A

Buy Now
Questions 34

You work as a project manager for BlueWell Inc. You are preparing to plan risk responses for your project with your team. How many risk response types are available for a negative risk event in the project?

Options:

A.

Three

B.

Seven

C.

One

D.

Four

Buy Now
Questions 35

Security Test and Evaluation (ST&E) is a component of risk assessment. It is useful in discovering system vulnerabilities. For what purposes is ST&E used? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To implement the design of system architecture

B.

To determine the adequacy of security mechanisms, assurances, and other properties to enforce the security policy

C.

To assess the degree of consistency between the system documentation and its implementation

D.

To uncover design, implementation, and operational flaws that may allow the violation of security policy

Buy Now
Questions 36

Which of the following DoD directives defines DITSCAP as the standard C&A process for the Department of Defense?

Options:

A.

DoD 8910.1

B.

DoD 5200.22-M

C.

DoD 8000.1

D.

DoD 5200.40

Buy Now
Questions 37

Which of the following testing methods verifies the interfaces between components against a software design?

Options:

A.

Regression testing

B.

Integration testing

C.

Black-box testing

D.

Unit testing

Buy Now
Questions 38

Which of the following statements is true about residual risks?

Options:

A.

It is the probabilistic risk after implementing all security measures.

B.

It can be considered as an indicator of threats coupled with vulnerability.

C.

It is a weakness or lack of safeguard that can be exploited by a threat.

D.

It is the probabilistic risk before implementing all security measures.

Buy Now
Questions 39

Bill is the project manager of the JKH Project. He and the project team have identified a risk event in the project with a high probability of occurrence and the risk event has a high cost impact on the project. Bill discusses the risk event with Virginia, the primary project customer, and she decides that the requirements surrounding the risk event should be removed from the project. The removal of the requirements does affect the project scope, but it can release the project from the high risk exposure. What risk response has been enacted in this project?

Options:

A.

Mitigation

B.

Transference

C.

Acceptance

D.

Avoidance

Buy Now
Questions 40

You are the project manager for GHY Project and are working to create a risk response for a negative risk. You and the project team have identified the risk that the project may not complete on time, as required by the management, due to the creation of the user guide for the software you're creating. You have elected to hire an external writer in order to satisfy the requirements and to alleviate the risk event. What type of risk response have you elected to use in this instance?

Options:

A.

Transference

B.

Exploiting

C.

Avoidance

D.

Sharing

Buy Now
Questions 41

Which of the following DoD directives is referred to as the Defense Automation Resources Management Manual?

Options:

A.

DoD 8910.1

B.

DoD 7950.1-M

C.

DoDD 8000.1

D.

DoD 5200.22-M

E.

DoD 5200.1-R

Buy Now
Questions 42

Which of the following are the types of access controls? Each correct answer represents a complete solution. Choose three.

Options:

A.

Physical

B.

Technical

C.

Administrative

D.

Automatic

Buy Now
Questions 43

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the pre-attack phase successfully: Information gathering Determination of network range Identification of active systems Location of open ports and applications Now, which of the following tasks should he perform next?

Options:

A.

Perform OS fingerprinting on the We-are-secure network.

B.

Map the network of We-are-secure Inc.

C.

Install a backdoor to log in remotely on the We-are-secure server.

D.

Fingerprint the services running on the we-are-secure network.

Buy Now
Questions 44

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

Options:

A.

Trademark law

B.

Security law

C.

Privacy law

D.

Copyright law

Buy Now
Questions 45

FIPS 199 defines the three levels of potential impact on organizations. Which of the following potential impact levels shows limited adverse effects on organizational operations, organizational assets, or individuals?

Options:

A.

Moderate

B.

Low

C.

Medium

D.

High

Buy Now
Questions 46

Which of the following tools is used to attack the Digital Watermarking?

Options:

A.

Steg-Only Attack

B.

Active Attacks

C.

2Mosaic

D.

Gifshuffle

Buy Now
Questions 47

The Phase 1 of DITSCAP C&A is known as Definition Phase. The goal of this phase is to define the C&A level of effort, identify the main C&A roles and responsibilities, and create an agreement on the method for implementing the security requirements. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Negotiation

B.

Registration

C.

Document mission need

D.

Initial Certification Analysis

Buy Now
Questions 48

Which of the following security design patterns provides an alternative by requiring that a user's authentication credentials be verified by the database before providing access to that user's data?

Options:

A.

Secure assertion

B.

Authenticated session

C.

Password propagation

D.

Account lockout

Buy Now
Questions 49

The IAM/CA makes certification accreditation recommendations to the DAA. The DAA issues accreditation determinations. Which of the following are the accreditation determinations issued by the DAA? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

IATT

B.

IATO

C.

DATO

D.

ATO

E.

ATT

Buy Now
Questions 50

You are the project manager of the CUL project in your organization. You and the project team are assessing the risk events and creating a probability and impact matrix for the identified risks. Which one of the following statements best describes the requirements for the data type used in qualitative risk analysis?

Options:

A.

A qualitative risk analysis encourages biased data to reveal risk tolerances.

B.

A qualitative risk analysis required unbiased stakeholders with biased risk tolerances.

C.

A qualitative risk analysis requires accurate and unbiased data if it is to be credible.

D.

A qualitative risk analysis requires fast and simple data to complete the analysis.

Buy Now
Questions 51

What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?

Options:

A.

Project Management Information System

B.

Integrated Change Control

C.

Configuration Management System

D.

Scope Verification

Buy Now
Questions 52

Which of the following software review processes increases the software security by removing the common vulnerabilities, such as format string exploits, race conditions, memory leaks, and buffer overflows?

Options:

A.

Management review

B.

Code review

C.

Peer review

D.

Software audit review

Buy Now
Exam Code: CSSLP
Exam Name: Certified Secure Software Lifecycle Professional
Last Update: Nov 21, 2024
Questions: 0
CSSLP pdf

CSSLP PDF

$28  $80
CSSLP Engine

CSSLP Testing Engine

$33.25  $95
CSSLP PDF + Engine

CSSLP PDF + Testing Engine

$297.5  $850