Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

ISC CSSLP Certified Secure Software Lifecycle Professional Exam Practice Test

Demo: 52 questions
Total 349 questions

Certified Secure Software Lifecycle Professional Questions and Answers

Question 1

Adrian is the project manager of the NHP Project. In her project there are several work packages that deal with electrical wiring. Rather than to manage the risk internally she has decided to hire a vendor to complete all work packages that deal with the electrical wiring. By removing the risk internally to a licensed electrician Adrian feels more comfortable with project team being safe. What type of risk response has Adrian used in this example?

Options:

A.

Acceptance

B.

Avoidance

C.

Mitigation

D.

Transference

Question 2

Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?

Options:

A.

FITSAF

B.

FIPS

C.

TCSEC

D.

SSAA

Question 3

Which of the following activities are performed by the 'Do' cycle component of PDCA (plan-do-check-act)? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It detects and responds to incidents properly.

B.

It determines controls and their objectives.

C.

It manages resources that are required to achieve a goal.

D.

It performs security awareness training.

E.

It operates the selected controls.

Question 4

Which of the following phases of the DITSCAP C&A process is used to define the C&A level of effort, to identify the main C&A roles and responsibilities, and to create an agreement on the method for implementing the security requirements?

Options:

A.

Phase 1

B.

Phase 4

C.

Phase 2

D.

Phase 3

Question 5

Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

Options:

A.

Valuations of the critical assets in hard costs.

B.

Evaluate potential threats to the assets.

C.

Estimate the potential losses to assets by determining their value.

D.

Establish the threats likelihood and regularity.

Question 6

Martha works as a Project Leader for BlueWell Inc. She and her team have developed accounting software. The software was performing well. Recently, the software has been modified. The users of this software are now complaining about the software not working properly. Which of the following actions will she take to test the software?

Options:

A.

Perform integration testing

B.

Perform regression testing

C.

Perform unit testing

D.

Perform acceptance testing

Question 7

Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?

Options:

A.

Business continuity plan development

B.

Business impact assessment

C.

Scope and plan initiation

D.

Plan approval and implementation

Question 8

Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?

Options:

A.

Denial-of-service attack

B.

Dictionary attack

C.

Man-in-the-middle attack

D.

Password guessing attack

Question 9

Which of the following terms ensures that no intentional or unintentional unauthorized modification is made to data?

Options:

A.

Non-repudiation

B.

Integrity

C.

Authentication

D.

Confidentiality

Question 10

You work as a security engineer for BlueWell Inc. According to you, which of the following DITSCAP/NIACAP model phases occurs at the initiation of the project, or at the initial C&A effort of a legacy system?

Options:

A.

Validation

B.

Definition

C.

Verification

D.

Post Accreditation

Question 11

Which of the following persons in an organization is responsible for rejecting or accepting the residual risk for a system?

Options:

A.

Information Systems Security Officer (ISSO)

B.

Designated Approving Authority (DAA)

C.

System Owner

D.

Chief Information Security Officer (CISO)

Question 12

Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?

Options:

A.

DDoS attack

B.

Evasion attack

C.

Insertion attack

D.

Dictionary attack

Question 13

The Software Configuration Management (SCM) process defines the need to trace changes, and the ability to verify that the final delivered software has all of the planned enhancements that are supposed to be included in the release. What are the procedures that must be defined for each software project to ensure that a sound SCM process is implemented? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Configuration status accounting

B.

Configuration change control

C.

Configuration identification

D.

Configuration audits

E.

Configuration implementation

F.

Configuration deployment

Question 14

Which of the following testing methods tests the system efficiency by systematically selecting the suitable and minimum set of tests that are required to effectively cover the affected changes?

Options:

A.

Unit testing

B.

Integration testing

C.

Acceptance testing

D.

Regression testing

Question 15

Which of the following are included in Technical Controls? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Identification and authentication methods

B.

Configuration of the infrastructure

C.

Password and resource management

D.

Implementing and maintaining access control mechanisms

E.

Security devices

F.

Conducting security-awareness training

Question 16

Which of the following refers to a process that is used for implementing information security?

Options:

A.

Classic information security model

B.

Five Pillars model

C.

Certification and Accreditation (C&A)

D.

Information Assurance (IA)

Question 17

Which of the following SDLC phases consists of the given security controls: Misuse Case Modeling Security Design and Architecture Review Threat and Risk Modeling Security Requirements and Test Cases Generation?

Options:

A.

Deployment

B.

Requirements Gathering

C.

Maintenance

D.

Design

Question 18

Drag and drop the appropriate external constructs in front of their respective functions.

Options:

Question 19

Which of the following are the responsibilities of the owner with regard to data in an information classification program? Each correct answer represents a complete solution. Choose three.

Options:

A.

Reviewing the classification assignments at regular time intervals and making changes as the business needs change.

B.

Running regular backups and routinely testing the validity of the backup data.

C.

Delegating the responsibility of the data protection duties to a custodian.

D.

Determining what level of classification the information requires.

Question 20

Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution. Choose three.

Options:

A.

It ensures that unauthorized modifications are not made to data by authorized personnel or processes.

B.

It determines the actions and behaviors of a single individual within a system

C.

It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.

D.

It ensures that modifications are not made to data by unauthorized personnel or processes.

Question 21

Which of the following describes a residual risk as the risk remaining after a risk mitigation has occurred?

Options:

A.

DIACAP

B.

SSAA

C.

DAA

D.

ISSO

Question 22

Security is a state of well-being of information and infrastructures in which the possibilities of successful yet undetected theft, tampering, and/or disruption of information and services are kept low or tolerable. Which of the following are the elements of security? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Integrity

B.

Authenticity

C.

Confidentiality

D.

Availability

Question 23

Which of the following classification levels defines the information that, if disclosed to the unauthorized parties, could be reasonably expected to cause exceptionally grave damage to the national security?

Options:

A.

Secret information

B.

Unclassified information

C.

Confidential information

D.

Top Secret information

Question 24

Which of the following documents were developed by NIST for conducting Certification & Accreditation (C&A)? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NIST Special Publication 800-60

B.

NIST Special Publication 800-53

C.

NIST Special Publication 800-37A

D.

NIST Special Publication 800-59

E.

NIST Special Publication 800-37

F.

NIST Special Publication 800-53A

Question 25

In which of the following SDLC phases is the system's security features configured and enabled, the system is tested and installed or fielded, and the system is authorized for processing?

Options:

A.

Development/Acquisition Phase

B.

Operation/Maintenance Phase

C.

Implementation Phase

D.

Initiation Phase

Question 26

Which of the following is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?

Options:

A.

Corrective controls

B.

Audit trail

C.

Security audit

D.

Detective controls

Question 27

Which of the following methods is a means of ensuring that system changes are approved before being implemented, only the proposed and approved changes are implemented, and the implementation is complete and accurate?

Options:

A.

Configuration control

B.

Documentation control

C.

Configuration identification

D.

Configuration auditing

Question 28

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

Options:

A.

Integrity

B.

Availability

C.

Non-repudiation

D.

Confidentiality

Question 29

John works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cost effective DRP testing plan. According to you, which of the following disaster recovery testing plans is the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises?

Options:

A.

Full-scale exercise

B.

Walk-through drill

C.

Structured walk-through test

D.

Evacuation drill

Question 30

According to the NIST SAMATE, dynamic analysis tools operate by generating runtime vulnerability scenario using some functions. Which of the following are functions that are used by the dynamic analysis tools and are summarized in the NIST SAMATE? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Implementation attack

B.

Source code security

C.

File corruption

D.

Network fault injection

Question 31

The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to obtain a fully integrated system for certification testing and accreditation. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Certification analysis

B.

Assessment of the Analysis Results

C.

Configuring refinement of the SSAA

D.

System development

E.

Registration

Question 32

Which of the following steps of the LeGrand Vulnerability-Oriented Risk Management method determines the necessary compliance offered by risk management practices and assessment of risk levels?

Options:

A.

Assessment, monitoring, and assurance

B.

Vulnerability management

C.

Risk assessment

D.

Adherence to security standards and policies for development and deployment

Question 33

You work as a Network Administrator for uCertify Inc. You need to secure web services of your company in order to have secure transactions. Which of the following will you recommend for providing security?

Options:

A.

SSL

B.

VPN

C.

S/MIME

D.

HTTP

Question 34

In which of the following deployment models of cloud is the cloud infrastructure administered by the organizations or a third party? Each correct answer represents a complete solution. Choose two.

Options:

A.

Private cloud

B.

Public cloud

C.

Hybrid cloud

D.

Community cloud

Question 35

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you want to discuss it with your team members for getting appropriate responses of the disaster. In which of the following disaster recovery tests can this task be performed?

Options:

A.

Structured walk-through test

B.

Full-interruption test

C.

Parallel test

D.

Simulation test

Question 36

The Phase 3 of DITSCAP C&A is known as Validation. The goal of Phase 3 is to validate that the preceding work has produced an IS that operates in a specified computing environment. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Certification and accreditation decision

B.

Continue to review and refine the SSAA

C.

Perform certification evaluation of the integrated system

D.

System development

E.

Develop recommendation to the DAA

Question 37

Martha registers a domain named Microsoft.in. She tries to sell it to Microsoft Corporation. The infringement of which of the following has she made?

Options:

A.

Copyright

B.

Trademark

C.

Patent

D.

Intellectual property

Question 38

You have a storage media with some data and you make efforts to remove this data. After performing this, you analyze that the data remains present on the media. Which of the following refers to the above mentioned condition?

Options:

A.

Object reuse

B.

Degaussing

C.

Residual

D.

Data remanence

Question 39

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

Options:

A.

Espionage law

B.

Trademark law

C.

Cyber law

D.

Copyright law

Question 40

Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

Options:

A.

Code Security law

B.

Patent laws

C.

Trademark laws

D.

Copyright laws

Question 41

You work as a project manager for BlueWell Inc. You with your team are using a method or a (technical) process that conceives the risks even if all theoretically possible safety measures would be applied. One of your team member wants to know that what is a residual risk. What will you reply to your team member?

Options:

A.

It is a risk that remains because no risk response is taken.

B.

It is a risk that can not be addressed by a risk response.

C.

It is a risk that will remain no matter what type of risk response is offered.

D.

It is a risk that remains after planned risk responses are taken.

Question 42

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

Options:

A.

Authentication

B.

Integrity

C.

Non-repudiation

D.

Confidentiality

Question 43

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet?

Options:

A.

DAS

B.

IPsec

C.

IDS

D.

ACL

Question 44

You are the project manager of the CUL project in your organization. You and the project team are assessing the risk events and creating a probability and impact matrix for the identified risks. Which one of the following statements best describes the requirements for the data type used in qualitative risk analysis?

Options:

A.

A qualitative risk analysis encourages biased data to reveal risk tolerances.

B.

A qualitative risk analysis required unbiased stakeholders with biased risk tolerances.

C.

A qualitative risk analysis requires accurate and unbiased data if it is to be credible.

D.

A qualitative risk analysis requires fast and simple data to complete the analysis.

Question 45

Which of the following statements about the availability concept of Information security management is true?

Options:

A.

It ensures that modifications are not made to data by unauthorized personnel or processes.

B.

It determines actions and behaviors of a single individual within a system.

C.

It ensures reliable and timely access to resources.

D.

It ensures that unauthorized modifications are not made to data by authorized personnel or processes.

Question 46

What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?

Options:

A.

Project Management Information System

B.

Integrated Change Control

C.

Configuration Management System

D.

Scope Verification

Question 47

Which of the following roles is also known as the accreditor?

Options:

A.

Data owner

B.

Chief Risk Officer

C.

Chief Information Officer

D.

Designated Approving Authority

Question 48

Which of the following process areas does the SSE-CMM define in the 'Project and Organizational Practices' category? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Provide Ongoing Skills and Knowledge

B.

Verify and Validate Security

C.

Manage Project Risk

D.

Improve Organization's System Engineering Process

Question 49

To help review or design security controls, they can be classified by several criteria . One of these criteria is based on their nature. According to this criterion, which of the following controls consists of incident response processes, management oversight, security awareness, and training?

Options:

A.

Compliance control

B.

Physical control

C.

Procedural control

D.

Technical control

Question 50

You work as a security engineer for BlueWell Inc. Which of the following documents will you use as a guide for the security certification and accreditation of Federal Information Systems?

Options:

A.

NIST Special Publication 800-60

B.

NIST Special Publication 800-53

C.

NIST Special Publication 800-37

D.

NIST Special Publication 800-59

Question 51

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

Options:

A.

RTO

B.

RTA

C.

RPO

D.

RCO

Question 52

Which of the following governance bodies directs and coordinates implementations of the information security program?

Options:

A.

Chief Information Security Officer

B.

Information Security Steering Committee

C.

Business Unit Manager

D.

Senior Management

Demo: 52 questions
Total 349 questions