Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Secure Software Lifecycle Professional

Last Update 7 hours ago Total Questions : 349

The Certified Secure Software Lifecycle Professional content is now fully updated, with all current exam questions added 7 hours ago. Deciding to include CSSLP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CSSLP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CSSLP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Secure Software Lifecycle Professional practice test comfortably within the allotted time.

Question # 81

In which of the following types of tests are the disaster recovery checklists distributed to the members of disaster recovery team and asked to review the assigned checklist?

A.

Parallel test

B.

Simulation test

C.

Full-interruption test

D.

Checklist test

Question # 82

Which of the following roles is also known as the accreditor?

A.

Data owner

B.

Chief Risk Officer

C.

Chief Information Officer

D.

Designated Approving Authority

Question # 83

Which of the following classification levels defines the information that, if disclosed to the unauthorized parties, could be reasonably expected to cause exceptionally grave damage to the national security?

A.

Secret information

B.

Unclassified information

C.

Confidential information

D.

Top Secret information

Question # 84

Which of the following is generally used in packages in order to determine the package or product tampering?

A.

Tamper resistance

B.

Tamper evident

C.

Tamper data

D.

Tamper proof

Question # 85

Which of the following plans is a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources?

A.

Contingency plan

B.

Continuity of Operations plan

C.

Disaster recovery plan

D.

Business Continuity plan

Question # 86

Which of the following elements sets up a requirement to receive the constrained requests over a protected layer connection, such as TLS (Transport Layer Security)?

A.

User data constraint

B.

Authorization constraint

C.

Web resource collection

D.

Accounting constraint

Question # 87

Which of the following elements of the BCP process emphasizes on creating the scope and the additional elements required to define the parameters of the plan?

A.

Business continuity plan development

B.

Plan approval and implementation

C.

Business impact analysis

D.

Scope and plan initiation

Question # 88

According to the NIST SAMATE, dynamic analysis tools operate by generating runtime vulnerability scenario using some functions. Which of the following are functions that are used by the dynamic analysis tools and are summarized in the NIST SAMATE? Each correct answer represents a complete solution. Choose all that apply.

A.

Implementation attack

B.

Source code security

C.

File corruption

D.

Network fault injection

Question # 89

Which of the following is an attack with IP fragments that cannot be reassembled?

A.

Password guessing attack

B.

Teardrop attack

C.

Dictionary attack

D.

Smurf attack

Question # 90

A number of security design patterns are developed for software assurance in general. Drag and drop the appropriate security design patterns in front of their respective descriptions.

Go to page: