Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Note: This exam is available on Demand only. You can Pre-Order this Exam and we will arrange this for you.

Pre-Order Your "CSSLP - Certified Secure Software Lifecycle Professional" Exam

You can pre-order your "Certified Secure Software Lifecycle Professional" exam to us if you are in need this urgent. Dumpsmate.com Team will prepare your Exam Questions & Answers From Real Exam within next 2 to 3 Weeks Time only.

How to Make Pre-Order You Exams:

  1. 1. Click to "Add to Cart" Button.
  2. 2. Our Expert will arrange real Exam Questions within 2 to 3 weeks especially for you.
  3. 3. You will be notified within 2 to 3 Weeks' time once your Exam is ready with all Real Questions and Possible Answers with PDF + Testing Engine format.

Why to Choose DumpsMate?

In the unlikely event if we can't make this exam available to you then you will issue a full refund! So there is no risk.

READY TO MAKE YOUR "CSSLP" PRE-ORDER?

$850

 Add To Cart

Question # 4

Which of the following provides an easy way to programmers for writing lower-risk applications and retrofitting security into an existing application?

A.

Watermarking

B.

ESAPI

C.

Encryption wrapper

D.

Code obfuscation

Full Access
Question # 5

Which of the following security issues does the Bell-La Padula model focus on?

A.

Authorization

B.

Confidentiality

C.

Integrity

D.

Authentication

Full Access
Question # 6

Which of the following is used by attackers to record everything a person types, including usernames, passwords, and account information?

A.

Packet sniffing

B.

Keystroke logging

C.

Spoofing

D.

Wiretapping

Full Access
Question # 7

Which of the following is a malicious exploit of a website, whereby unauthorized commands are transmitted from a user trusted by the website?

A.

Cross-Site Scripting

B.

Injection flaw

C.

Side channel attack

D.

Cross-Site Request Forgery

Full Access
Question # 8

System Authorization is the risk management process. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization Process. What are the different phases of System Authorization Plan? Each correct answer represents a part of the solution. Choose all that apply.

A.

Post-certification

B.

Post-Authorization

C.

Authorization

D.

Pre-certification

E.

Certification

Full Access
Question # 9

Which of the following activities are performed by the 'Do' cycle component of PDCA (plan-do-check-act)? Each correct answer represents a complete solution. Choose all that apply.

A.

It detects and responds to incidents properly.

B.

It determines controls and their objectives.

C.

It manages resources that are required to achieve a goal.

D.

It performs security awareness training.

E.

It operates the selected controls.

Full Access
Question # 10

Which of the following security objectives are defined for information and information systems by the FISMA? Each correct answer represents a part of the solution. Choose all that apply.

A.

Authenticity

B.

Availability

C.

Integrity

D.

Confidentiality

Full Access
Question # 11

Which of the following US Acts emphasized a "risk-based policy for cost-effective security" and makes mandatory for agency program officials, chief information officers, and inspectors general (IGs) to conduct annual reviews of the agency's information security program and report the results to Office of Management and Budget?

A.

Federal Information Security Management Act of 2002 (FISMA)

B.

The Electronic Communications Privacy Act of 1986 (ECPA)

C.

The Equal Credit Opportunity Act (ECOA)

D.

The Fair Credit Reporting Act (FCRA)

Full Access
Question # 12

Which of the following ISO standards is entitled as "Information technology - Security techniques - Information security management - Measurement"?

A.

ISO 27003

B.

ISO 27005

C.

ISO 27004

D.

ISO 27006

Full Access
Question # 13

Which of the following security models focuses on data confidentiality and controlled access to classified information?

A.

Clark-Wilson model

B.

Biba model

C.

Take-Grant model

D.

Bell-La Padula model

Full Access
Question # 14

In digital rights management, the level of robustness depends on the various types of tools and attacks to which they must be resistant or immune. Which of the following types of tools are expensive, require skill, and are not easily available?

A.

Hand tools

B.

Widely available tools

C.

Specialized tools

D.

Professional tools

Full Access
Question # 15

Which of the following classification levels defines the information that, if disclosed to the unauthorized parties, could be reasonably expected to cause exceptionally grave damage to the national security?

A.

Secret information

B.

Unclassified information

C.

Confidential information

D.

Top Secret information

Full Access
Question # 16

Frank is the project manager of the NHH Project. He is working with the project team to create a plan to document the procedures to manage risks throughout the project. This document will define how risks will be identified and quantified. It will also define how contingency plans will be implemented by the project team. What document is Frank and the NHH Project team creating in this scenario?

A.

Risk management plan

B.

Project plan

C.

Project management plan

D.

Resource management plan

Full Access
Question # 17

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

A.

Backup policy

B.

User password policy

C.

Privacy policy

D.

Network security policy

Full Access
Question # 18

Fill in the blank with an appropriate security type. applies the internal security policies of the software applications when they are deployed.

A.

Programmatic security

Full Access
Question # 19

Which of the following models manages the software development process if the developers are limited to go back only one stage to rework?

A.

Waterfall model

B.

Spiral model

C.

RAD model

D.

Prototyping model

Full Access
Question # 20

Which of the following statements describe the main purposes of a Regulatory policy? Each correct answer represents a complete solution. Choose all that apply.

A.

It acknowledges the importance of the computing resources to the business model

B.

It provides a statement of support for information security throughout the enterprise

C.

It ensures that an organization is following the standard procedures or base practices of operation in its specific industry.

D.

It gives an organization the confidence that it is following the standard and accepted industry policy.

Full Access
Question # 21

How can you calculate the Annualized Loss Expectancy (ALE) that may occur due to a threat?

A.

Single Loss Expectancy (SLE) X Annualized Rate of Occurrence (ARO)

B.

Single Loss Expectancy (SLE)/ Exposure Factor (EF)

C.

Asset Value X Exposure Factor (EF)

D.

Exposure Factor (EF)/Single Loss Expectancy (SLE)

Full Access
Question # 22

Which of the following elements of the BCP process emphasizes on creating the scope and the additional elements required to define the parameters of the plan?

A.

Business continuity plan development

B.

Plan approval and implementation

C.

Business impact analysis

D.

Scope and plan initiation

Full Access
Question # 23

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?

A.

Discretionary Access Control

B.

Mandatory Access Control

C.

Policy Access Control

D.

Role-Based Access Control

Full Access
Question # 24

An assistant from the HR Department calls you to ask the Service Hours & Maintenance Slots for your ERP system. In which document will you most probably find this information?

A.

Service Level Agreement

B.

Release Policy

C.

Service Level Requirements

D.

Underpinning Contract

Full Access
Question # 25

Which of the following is generally used in packages in order to determine the package or product tampering?

A.

Tamper resistance

B.

Tamper evident

C.

Tamper data

D.

Tamper proof

Full Access
Question # 26

Which of the following phases of NIST SP 800-37 C&A methodology examines the residual risk for acceptability, and prepares the final security accreditation package?

A.

Security Accreditation

B.

Initiation

C.

Continuous Monitoring

D.

Security Certification

Full Access
Question # 27

Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?

A.

FITSAF

B.

FIPS

C.

TCSEC

D.

SSAA

Full Access
Question # 28

Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?

A.

Denial-of-service attack

B.

Dictionary attack

C.

Man-in-the-middle attack

D.

Password guessing attack

Full Access
Question # 29

In which of the following phases of the DITSCAP process does Security Test and Evaluation (ST&E) occur?

A.

Phase 2

B.

Phase 4

C.

Phase 3

D.

Phase 1

Full Access
Question # 30

In which of the following deployment models of cloud is the cloud infrastructure operated exclusively for an organization?

A.

Public cloud

B.

Community cloud

C.

Private cloud

D.

Hybrid cloud

Full Access
Question # 31

Which of the following sections come under the ISO/IEC 27002 standard?

A.

Security policy

B.

Asset management

C.

Financial assessment

D.

Risk assessment

Full Access
Question # 32

You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?

A.

Availability

B.

Confidentiality

C.

Non repudiation

D.

Data Protection

Full Access
Question # 33

Which of the following specifies access privileges to a collection of resources by using the URL mapping?

A.

Code Access Security

B.

Security constraint

C.

Configuration Management

D.

Access Management

Full Access
Question # 34

Which of the following statements are true about declarative security? Each correct answer represents a complete solution. Choose all that apply.

A.

It is employed in a layer that relies outside of the software code or uses attributes of the code.

B.

It applies the security policies on the software applications at their runtime.

C.

In this security, authentication decisions are made based on the business logic.

D.

In this security, the security decisions are based on explicit statements.

Full Access
Question # 35

In which of the following DIACAP phases is residual risk analyzed?

A.

Phase 1

B.

Phase 5

C.

Phase 2

D.

Phase 4

E.

Phase 3

Full Access
Question # 36

What are the security advantages of virtualization, as described in the NIST Information Security and Privacy Advisory Board (ISPAB) paper "Perspectives on Cloud Computing and Standards"? Each correct answer represents a complete solution. Choose three.

A.

It increases capabilities for fault tolerant computing.

B.

It adds a layer of security for defense-in-depth.

C.

It decreases exposure of weak software.

D.

It decreases configuration effort.

Full Access
Question # 37

FIPS 199 defines the three levels of potential impact on organizations. Which of the following potential impact levels shows limited adverse effects on organizational operations, organizational assets, or individuals?

A.

Moderate

B.

Low

C.

Medium

D.

High

Full Access
Question # 38

Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject?

A.

Take-Grant Protection Model

B.

Biba Integrity Model

C.

Bell-LaPadula Model

D.

Access Matrix

Full Access
Question # 39

Which of the following individuals inspects whether the security policies, standards, guidelines, and procedures are efficiently performed in accordance with the company's stated security objectives?

A.

Information system security professional

B.

Data owner

C.

Senior management

D.

Information system auditor

Full Access
Question # 40

You work as a project manager for BlueWell Inc. You are working on a project and the management wants a rapid and cost-effective means for establishing priorities for planning risk responses in your project. Which risk management process can satisfy management's objective for your project?

A.

Qualitative risk analysis

B.

Historical information

C.

Rolling wave planning

D.

Quantitative analysis

Full Access
Question # 41

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation? Each correct answer represents a complete solution. Choose two.

A.

Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.

B.

Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.

C.

Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.

D.

Certification is the official management decision given by a senior agency official to authorize operation of an information system.

Full Access
Question # 42

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

A.

A-rated

B.

B-rated

C.

D-rated

D.

C-rated

Full Access
Question # 43

There are seven risks responses that a project manager can choose from. Which risk response is appropriate for both positive and negative risk events?

A.

Acceptance

B.

Transference

C.

Sharing

D.

Mitigation

Full Access
Question # 44

The Phase 4 of DITSCAP C&A is known as Post Accreditation. This phase starts after the system has been accredited in Phase 3. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.

A.

Security operations

B.

Maintenance of the SSAA

C.

Compliance validation

D.

Change management

E.

System operations

F.

Continue to review and refine the SSAA

Full Access
Question # 45

Which of the following coding practices are helpful in simplifying code? Each correct answer represents a complete solution. Choose all that apply.

A.

Programmers should use multiple small and simple functions rather than a single complex function.

B.

Software should avoid ambiguities and hidden assumptions, recursions, and GoTo statements. C. Programmers should implement high-consequence functions in minimum required lines of code and follow proper coding standards.

C.

Processes should have multiple entry and exit points.

Full Access
Question # 46

Della work as a project manager for BlueWell Inc. A threat with a dollar value of $250,000 is expected to happen in her project and the frequency of threat occurrence per year is 0.01. What will be the annualized loss expectancy in her project?

A.

$2,000

B.

$2,500

C.

$3,510

D.

$3,500

Full Access
Question # 47

The Phase 1 of DITSCAP C&A is known as Definition Phase. The goal of this phase is to define the C&A level of effort, identify the main C&A roles and responsibilities, and create an agreement on the method for implementing the security requirements. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.

A.

Negotiation

B.

Registration

C.

Document mission need

D.

Initial Certification Analysis

Full Access
Question # 48

You are the project manager of the NNN project for your company. You and the project team are working together to plan the risk responses for the project. You feel that the team has successfully completed the risk response planning and now you must initiate what risk process it is. Which of the following risk processes is repeated after the plan risk responses to determine if the overall project risk has been satisfactorily decreased?

A.

Quantitative risk analysis

B.

Risk identification

C.

Risk response implementation

D.

Qualitative risk analysis

Full Access
Question # 49

Which of the following attacks causes software to fail and prevents the intended users from accessing software?

A.

Enabling attack

B.

Reconnaissance attack

C.

Sabotage attack

D.

Disclosure attack

Full Access
Question # 50

Which of the following actions does the Data Loss Prevention (DLP) technology take when an agent detects a policy violation for data of all states? Each correct answer represents a complete solution. Choose all that apply.

A.

It creates an alert.

B.

It quarantines the file to a secure location.

C.

It reconstructs the session.

D.

It blocks the transmission of content.

Full Access
Question # 51

What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?

A.

Project Management Information System

B.

Integrated Change Control

C.

Configuration Management System

D.

Scope Verification

Full Access
Question # 52

In which of the following types of tests are the disaster recovery checklists distributed to the members of disaster recovery team and asked to review the assigned checklist?

A.

Parallel test

B.

Simulation test

C.

Full-interruption test

D.

Checklist test

Full Access