Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Secure Software Lifecycle Professional

Last Update 7 hours ago Total Questions : 349

The Certified Secure Software Lifecycle Professional content is now fully updated, with all current exam questions added 7 hours ago. Deciding to include CSSLP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CSSLP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CSSLP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Secure Software Lifecycle Professional practice test comfortably within the allotted time.

Question # 41

Which of the following ISO standards provides guidelines for accreditation of an organization that is concerned with certification and registration related to ISMS?

A.

ISO 27006

B.

ISO 27005

C.

ISO 27003

D.

ISO 27004

Question # 42

Which of the following describes the acceptable amount of data loss measured in time?

A.

Recovery Point Objective (RPO)

B.

Recovery Time Objective (RTO)

C.

Recovery Consistency Objective (RCO)

D.

Recovery Time Actual (RTA)

Question # 43

You work as a Network Administrator for uCertify Inc. You need to secure web services of your company in order to have secure transactions. Which of the following will you recommend for providing security?

A.

SSL

B.

VPN

C.

S/MIME

D.

HTTP

Question # 44

John works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cost effective DRP testing plan. According to you, which of the following disaster recovery testing plans is the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises?

A.

Full-scale exercise

B.

Walk-through drill

C.

Structured walk-through test

D.

Evacuation drill

Question # 45

Which of the following is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?

A.

Corrective controls

B.

Audit trail

C.

Security audit

D.

Detective controls

Question # 46

The rights of an author or a corporation to make profit from the creation of their products (such as software, music, etc.) are protected by the Intellectual Property law. Which of the following are the components of the Intellectual Property law? Each correct answer represents a part of the solution. Choose two.

A.

Trademark law

B.

Industrial Property law

C.

Copyright law

D.

Patent law

Question # 47

Which of the following are Service Level Agreement (SLA) structures as defined by ITIL? Each correct answer represents a complete solution. Choose all that apply.

A.

Component Based

B.

Service Based

C.

Segment Based

D.

Customer Based

E.

Multi-Level

Question # 48

Which of the following security models focuses on data confidentiality and controlled access to classified information?

A.

Clark-Wilson model

B.

Biba model

C.

Take-Grant model

D.

Bell-La Padula model

Question # 49

Which of the following characteristics are described by the DIAP Information Readiness Assessment function? Each correct answer represents a complete solution. Choose all that apply.

A.

It provides for entry and storage of individual system data.

B.

It performs vulnerability/threat analysis assessment.

C.

It provides data needed to accurately assess IA readiness.

D.

It identifies and generates IA requirements.

Question # 50

You work as a Security Manager for Tech Perfect Inc. The company has a Windows based network. It is required to determine compatibility of the systems with custom applications. Which of the following techniques will you use to accomplish the task?

A.

Safe software storage

B.

Antivirus management

C.

Backup control

D.

Software testing

Go to page: