Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Secure Software Lifecycle Professional

Last Update 7 hours ago Total Questions : 349

The Certified Secure Software Lifecycle Professional content is now fully updated, with all current exam questions added 7 hours ago. Deciding to include CSSLP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CSSLP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CSSLP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Secure Software Lifecycle Professional practice test comfortably within the allotted time.

Question # 31

Which of the following are included in Technical Controls? Each correct answer represents a complete solution. Choose all that apply.

A.

Identification and authentication methods

B.

Configuration of the infrastructure

C.

Password and resource management

D.

Implementing and maintaining access control mechanisms

E.

Security devices

F.

Conducting security-awareness training

Question # 32

Fred is the project manager of the CPS project. He is working with his project team to prioritize the identified risks within the CPS project. He and the team are prioritizing risks for further analysis or action by assessing and combining the risks probability of occurrence and impact. What process is Fred completing?

A.

Risk identification

B.

Risk Breakdown Structure creation

C.

Perform qualitative analysis

D.

Perform quantitative analysis

Question # 33

Which of the following are the primary functions of configuration management?

Each correct answer represents a complete solution. Choose all that apply.

A.

It removes the risk event entirely by adding additional steps to avoid the event.

B.

It ensures that the change is implemented in a sequential manner through formalized testing.

C.

It reduces the negative impact that the change might have had on the computing services and resources.

D.

It analyzes the effect of the change that is implemented on the system.

Question # 34

In which of the following architecture styles does a device receive input from connectors and generate transformed outputs?

A.

N-tiered

B.

Heterogeneous

C.

Pipes and filters

D.

Layered

Question # 35

You work as a security manager for BlueWell Inc. You are going through the NIST SP 800-37 C & A methodology, which is based on four well defined phases. In which of the following phases of NIST SP 800-37 C & A methodology does the security categorization occur?

A.

Security Accreditation

B.

Security Certification

C.

Continuous Monitoring

D.

Initiation

Question # 36

Which of the following security models dictates that subjects can only access objects through applications?

A.

Biba model

B.

Bell-LaPadula

C.

Clark-Wilson

D.

Biba-Clark model

Question # 37

Which of the following activities are performed by the ' Do ' cycle component of PDCA (plan-do-check-act)? Each correct answer represents a complete solution. Choose all that apply.

A.

It detects and responds to incidents properly.

B.

It determines controls and their objectives.

C.

It manages resources that are required to achieve a goal.

D.

It performs security awareness training.

E.

It operates the selected controls.

Question # 38

At which of the following levels of robustness in DRM must the security functions be immune to widely available tools and specialized tools and resistant to professional tools?

A.

Level 2

B.

Level 4

C.

Level 1

D.

Level 3

Question # 39

Which of the following are the principle duties performed by the BIOS during POST (power-on-self-test)? Each correct answer represents a part of the solution. Choose all that apply.

A.

It provides a user interface for system ' s configuration.

B.

It identifies, organizes, and selects boot devices.

C.

It delegates control to other BIOS, if it is required.

D.

It discovers size and verifies system memory.

E.

It verifies the integrity of the BIOS code itself.

F.

It interrupts the execution of all running programs.

Question # 40

Which of the following is used by attackers to record everything a person types, including usernames, passwords, and account information?

A.

Packet sniffing

B.

Keystroke logging

C.

Spoofing

D.

Wiretapping

Go to page: