Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Secure Software Lifecycle Professional

Last Update 6 hours ago Total Questions : 349

The Certified Secure Software Lifecycle Professional content is now fully updated, with all current exam questions added 6 hours ago. Deciding to include CSSLP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CSSLP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CSSLP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Secure Software Lifecycle Professional practice test comfortably within the allotted time.

Question # 1

Which of the following access control models are used in the commercial sector? Each correct answer represents a complete solution. Choose two.

A.

Biba model

B.

Clark-Biba model

C.

Clark-Wilson model

D.

Bell-LaPadula model

Question # 2

The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.

A.

Architectural components abstraction

B.

SOA value proposition

C.

Business traceability

D.

Disaster recovery planning

E.

Software assets reuse

Question # 3

Which of the following phases of DITSCAP includes the activities that are necessary for the continuing operation of an accredited IT system in its computing environment and for addressing the changing threats that a system faces throughout its life cycle?

A.

Phase 2, Verification

B.

Phase 3, Validation

C.

Phase 1, Definition

D.

Phase 4, Post Accreditation Phase

Question # 4

Which of the following testing methods verifies the interfaces between components against a software design?

A.

Regression testing

B.

Integration testing

C.

Black-box testing

D.

Unit testing

Question # 5

Which of the following tools is used to attack the Digital Watermarking?

A.

Steg-Only Attack

B.

Active Attacks

C.

2Mosaic

D.

Gifshuffle

Question # 6

The Phase 1 of DITSCAP C & A is known as Definition Phase. The goal of this phase is to define the C & A level of effort, identify the main C & A roles and responsibilities, and create an agreement on the method for implementing the security requirements. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.

A.

Negotiation

B.

Registration

C.

Document mission need

D.

Initial Certification Analysis

Question # 7

An asset with a value of $600,000 is subject to a successful malicious attack threat twice a year. The asset has an exposure of 30 percent to the threat. What will be the annualized loss expectancy?

A.

$360,000

B.

$180,000

C.

$280,000

D.

$540,000

Question # 8

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls?

A.

Information Assurance (IA)

B.

Information systems security engineering (ISSE)

C.

Certification and accreditation (C & A)

D.

Risk Management

Question # 9

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet?

A.

DAS

B.

IPsec

C.

IDS

D.

ACL

Question # 10

You work as a Network Auditor for Net Perfect Inc. The company has a Windows-based network. While auditing the company ' s network, you are facing problems in searching the faults and other entities that belong to it. Which of the following risks may occur due to the existence of these problems?

A.

Residual risk

B.

Secondary risk

C.

Detection risk

D.

Inherent risk

Go to page: