Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Secure Software Lifecycle Professional

Last Update 7 hours ago Total Questions : 349

The Certified Secure Software Lifecycle Professional content is now fully updated, with all current exam questions added 7 hours ago. Deciding to include CSSLP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CSSLP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CSSLP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Secure Software Lifecycle Professional practice test comfortably within the allotted time.

Question # 21

Which of the following federal agencies has the objective to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life?

A.

National Security Agency (NSA)

B.

National Institute of Standards and Technology (NIST)

C.

United States Congress

D.

Committee on National Security Systems (CNSS)

Question # 22

Which of the following provides an easy way to programmers for writing lower-risk applications and retrofitting security into an existing application?

A.

Watermarking

B.

Code obfuscation

C.

Encryption wrapper

D.

ESAPI

Question # 23

Which of the following persons in an organization is responsible for rejecting or accepting the residual risk for a system?

A.

Information Systems Security Officer (ISSO)

B.

Designated Approving Authority (DAA)

C.

System Owner

D.

Chief Information Security Officer (CISO)

Question # 24

Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?

A.

FITSAF

B.

FIPS

C.

TCSEC

D.

SSAA

Question # 25

Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.

A.

File and object access

B.

Data downloading from the Internet

C.

Printer access

D.

Network logons and logoffs

Question # 26

You are the project manager for your organization. You are preparing for the quantitative risk analysis. Mark, a project team member, wants to know why you need to do quantitative risk analysis when you just completed qualitative risk analysis. Which one of the following statements best defines what quantitative risk analysis is?

A.

Quantitative risk analysis is the process of prioritizing risks for further analysis or action by assessing and combining their probability of occurrence and impact.

B.

Quantitative risk analysis is the review of the risk events with the high probability and the highest impact on the project objectives.

C.

Quantitative risk analysis is the planning and quantification of risk responses based on probability and impact of each risk event.

D.

Quantitative risk analysis is the process of numerically analyzing the effect of identified risks on overall project objectives.

Question # 27

You are the project manager of the CUL project in your organization. You and the project team are assessing the risk events and creating a probability and impact matrix for the identified risks. Which one of the following statements best describes the requirements for the data type used in qualitative risk analysis?

A.

A qualitative risk analysis encourages biased data to reveal risk tolerances.

B.

A qualitative risk analysis required unbiased stakeholders with biased risk tolerances.

C.

A qualitative risk analysis requires accurate and unbiased data if it is to be credible.

D.

A qualitative risk analysis requires fast and simple data to complete the analysis.

Question # 28

Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution. Choose all that apply.

A.

Editor

B.

Custodian

C.

Owner

D.

User

E.

Security auditor

Question # 29

Which of the following software review processes increases the software security by removing the common vulnerabilities, such as format string exploits, race conditions, memory leaks, and buffer overflows?

A.

Management review

B.

Code review

C.

Peer review

D.

Software audit review

Question # 30

Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?

A.

Contingency plan

B.

Business continuity plan

C.

Crisis communication plan

D.

Disaster recovery plan

Go to page: