Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Secure Software Lifecycle Professional

Last Update 7 hours ago Total Questions : 349

The Certified Secure Software Lifecycle Professional content is now fully updated, with all current exam questions added 7 hours ago. Deciding to include CSSLP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CSSLP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CSSLP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Secure Software Lifecycle Professional practice test comfortably within the allotted time.

Question # 71

The Software Configuration Management (SCM) process defines the need to trace changes, and the ability to verify that the final delivered software has all of the planned enhancements that are supposed to be included in the release. What are the procedures that must be defined for each software project to ensure that a sound SCM process is implemented? Each correct answer represents a complete solution. Choose all that apply.

A.

Configuration status accounting

B.

Configuration change control

C.

Configuration identification

D.

Configuration audits

E.

Configuration implementation

F.

Configuration deployment

Question # 72

Which of the following are the types of access controls? Each correct answer represents a complete solution. Choose three.

A.

Physical

B.

Technical

C.

Administrative

D.

Automatic

Question # 73

You work as a project manager for a company. The company has started a new security software project. The software configuration management will be used throughout the lifecycle of the project. You are tasked to modify the functional features and the basic logic of the software and then make them compatible to the initial design of the project. Which of the following procedures of the configuration management will you follow to accomplish the task?

A.

Configuration status accounting

B.

Configuration control

C.

Configuration audits

D.

Configuration identification

Question # 74

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

A.

Quantitative risk analysis

B.

Qualitative risk analysis

C.

Seven risk responses

D.

A risk probability-impact matrix

Question # 75

You work as the senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?

A.

Configuration status accounting

B.

Configuration identification

C.

Configuration auditing

D.

Configuration control

Question # 76

Which of the following is a name, symbol, or slogan with which a product is identified?

A.

Trademark

B.

Copyright

C.

Trade secret

D.

Patent

Question # 77

FIPS 199 defines the three levels of potential impact on organizations. Which of the following potential impact levels shows limited adverse effects on organizational operations, organizational assets, or individuals?

A.

Moderate

B.

Low

C.

Medium

D.

High

Question # 78

Fill in the blank with an appropriate phrase. models address specifications, requirements, design, verification and validation, and maintenance activities. A. Life cycle

Question # 79

Which of the following NIST Special Publication documents provides a guideline on network security testing?

A.

NIST SP 800-42

B.

NIST SP 800-53A

C.

NIST SP 800-60

D.

NIST SP 800-53

E.

NIST SP 800-37

F.

NIST SP 800-59

Question # 80

Which of the following secure coding principles and practices defines the appearance of code listing so that a code reviewer and maintainer who have not written that code can easily understand it?

A.

Make code forward and backward traceable

B.

Review code during and after coding

C.

Use a consistent coding style

D.

Keep code simple and small

Go to page: