Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Secure Software Lifecycle Professional

Last Update 7 hours ago Total Questions : 349

The Certified Secure Software Lifecycle Professional content is now fully updated, with all current exam questions added 7 hours ago. Deciding to include CSSLP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CSSLP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CSSLP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Secure Software Lifecycle Professional practice test comfortably within the allotted time.

Question # 61

Which of the following phases of DITSCAP includes the activities that are necessary for the continuing operation of an accredited IT system in its computing environment and for addressing the changing threats that a system faces throughout its life cycle?

A.

Phase 3, Validation

B.

Phase 1, Definition

C.

Phase 2, Verification

D.

Phase 4, Post Accreditation Phase

Question # 62

Which of the following life cycle modeling activities establishes service relationships and message exchange paths?

A.

Service-oriented logical design modeling

B.

Service-oriented conceptual architecture modeling

C.

Service-oriented discovery and analysis modeling

D.

Service-oriented business integration modeling

Question # 63

Which of the following methods determines the principle name of the current user and returns the jav a.security.Principal object in the HttpServletRequest interface?

A.

getUserPrincipal()

B.

isUserInRole()

C.

getRemoteUser()

D.

getCallerPrincipal()

Question # 64

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

A.

Espionage law

B.

Trademark law

C.

Cyber law

D.

Copyright law

Question # 65

Which of the following types of signatures is used in an Intrusion Detection System to trigger on attacks that attempt to reduce the level of a resource or system, or to cause it to crash?

A.

Access

B.

Benign

C.

DoS

D.

Reconnaissance

Question # 66

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?

A.

Configuration Identification

B.

Configuration Verification and Auditing

C.

Configuration Status Accounting

D.

Configuration Item Costing

Question # 67

You are the project manager of the NNN project for your company. You and the project team are working together to plan the risk responses for the project. You feel that the team has successfully completed the risk response planning and now you must initiate what risk process it is. Which of the following risk processes is repeated after the plan risk responses to determine if the overall project risk has been satisfactorily decreased?

A.

Quantitative risk analysis

B.

Risk identification

C.

Risk response implementation

D.

Qualitative risk analysis

Question # 68

Which of the following security design patterns provides an alternative by requiring that a user ' s authentication credentials be verified by the database before providing access to that user ' s data?

A.

Secure assertion

B.

Authenticated session

C.

Password propagation

D.

Account lockout

Question # 69

Microsoft software security expert Michael Howard defines some heuristics for determining code review in " A Process for Performing Security Code Reviews " . Which of the following heuristics increase the application ' s attack surface? Each correct answer represents a complete solution. Choose all that apply.

A.

Code written in C/C++/assembly language

B.

Code listening on a globally accessible network interface

C.

Code that changes frequently

D.

Anonymously accessible code

E.

Code that runs by default

F.

Code that runs in elevated context

Question # 70

What are the various activities performed in the planning phase of the Software Assurance Acquisition process? Each correct answer represents a complete solution. Choose all that apply.

A.

Develop software requirements.

B.

Implement change control procedures.

C.

Develop evaluation criteria and evaluation plan.

D.

Create acquisition strategy.

Go to page: