Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium ISC CSSLP Dumps Questions Answers

Page: 1 / 13
Total 349 questions

Certified Secure Software Lifecycle Professional Questions and Answers

Question 1

Which of the following plans is a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources?

Options:

A.

Contingency plan

B.

Continuity of Operations plan

C.

Disaster recovery plan

D.

Business Continuity plan

Buy Now
Question 2

You work as a security engineer for BlueWell Inc. You want to use some techniques and procedures to verify the effectiveness of security controls in Federal Information System. Which of the following NIST documents will guide you?

Options:

A.

NIST Special Publication 800-53

B.

NIST Special Publication 800-59

C.

NIST Special Publication 800-53A

D.

NIST Special Publication 800-37

Question 3

Which of the following NIST documents provides a guideline for identifying an information system as a National Security System?

Options:

A.

NIST SP 800-37

B.

NIST SP 800-59

C.

NIST SP 800-53

D.

NIST SP 800-60

E.

NIST SP 800-53A

Question 4

Which of the following security objectives are defined for information and information systems by the FISMA? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Authenticity

B.

Availability

C.

Integrity

D.

Confidentiality

Question 5

Security code review identifies the unvalidated input calls made by an attacker and avoids those calls to be processed by the server. It performs various review checks on the stained calls of servlet for identifying unvalidated input from the attacker. Choose the appropriate review checks and drop them in front of their respective functions.

Options:

Question 6

Which of the following phases of DITSCAP includes the activities that are necessary for the continuing operation of an accredited IT system in its computing environment and for addressing the changing threats that a system faces throughout its life cycle?

Options:

A.

Phase 2, Verification

B.

Phase 3, Validation

C.

Phase 1, Definition

D.

Phase 4, Post Accreditation Phase

Question 7

Which of the following methods is a means of ensuring that system changes are approved before being implemented, only the proposed and approved changes are implemented, and the implementation is complete and accurate?

Options:

A.

Configuration control

B.

Documentation control

C.

Configuration identification

D.

Configuration auditing

Question 8

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

Options:

A.

Confidentiality

B.

Non-repudiation

C.

Authentication

D.

Integrity

Question 9

Copyright holders, content providers, and manufacturers use digital rights management (DRM) in order to limit usage of digital media and devices. Which of the following security challenges does DRM include? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

OTA provisioning

B.

Access control

C.

Key hiding

D.

Device fingerprinting

Question 10

An assistant from the HR Department calls you to ask the Service Hours & Maintenance Slots for your ERP system. In which document will you most probably find this information?

Options:

A.

Service Level Agreement

B.

Release Policy

C.

Service Level Requirements

D.

Underpinning Contract

Question 11

Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution. Choose three.

Options:

A.

It ensures that unauthorized modifications are not made to data by authorized personnel or processes.

B.

It determines the actions and behaviors of a single individual within a system

C.

It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.

D.

It ensures that modifications are not made to data by unauthorized personnel or processes.

Question 12

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

Options:

A.

SNMP enumeration

B.

IIS buffer overflow

C.

NetBIOS NULL session

D.

DNS zone transfer

Question 13

Which of the following models manages the software development process if the developers are limited to go back only one stage to rework?

Options:

A.

Waterfall model

B.

Spiral model

C.

RAD model

D.

Prototyping model

Question 14

Security is a state of well-being of information and infrastructures in which the possibilities of successful yet undetected theft, tampering, and/or disruption of information and services are kept low or tolerable. Which of the following are the elements of security? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Integrity

B.

Authenticity

C.

Confidentiality

D.

Availability

Question 15

In which of the following testing methods is the test engineer equipped with the knowledge of system and designs test cases or test data based on system knowledge?

Options:

A.

Integration testing

B.

Regression testing

C.

Whitebox testing

D.

Graybox testing

Question 16

Which of the following configuration management system processes keeps track of the changes so that the latest acceptable configuration specifications are readily available?

Options:

A.

Configuration Control

B.

Configuration Status and Accounting

C.

Configuration Verification and Audit

D.

Configuration Identification

Question 17

You work as a Network Administrator for uCertify Inc. You need to secure web services of your company in order to have secure transactions. Which of the following will you recommend for providing security?

Options:

A.

SSL

B.

VPN

C.

S/MIME

D.

HTTP

Question 18

Which of the following elements sets up a requirement to receive the constrained requests over a protected layer connection, such as TLS (Transport Layer Security)?

Options:

A.

User data constraint

B.

Authorization constraint

C.

Web resource collection

D.

Accounting constraint

Question 19

Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?

Options:

A.

Contingency plan

B.

Business continuity plan

C.

Crisis communication plan

D.

Disaster recovery plan

Question 20

Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.

Options:

A.

File and object access

B.

Data downloading from the Internet

C.

Printer access

D.

Network logons and logoffs

Question 21

System Authorization is the risk management process. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization Process. What are the different phases of System Authorization Plan? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Post-certification

B.

Post-Authorization

C.

Authorization

D.

Pre-certification

E.

Certification

Question 22

Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.

Options:

A.

Password policies

B.

Data classification

C.

Data encryption

D.

Vulnerability assessments

Question 23

You work as a Security Manager for Tech Perfect Inc. The company has a Windows based network. It is required to determine compatibility of the systems with custom applications. Which of the following techniques will you use to accomplish the task?

Options:

A.

Safe software storage

B.

Antivirus management

C.

Backup control

D.

Software testing

Question 24

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy?

Options:

A.

Common data security architecture (CDSA)

B.

Application program interface (API)

C.

Trusted computing base (TCB)

D.

Internet Protocol Security (IPSec)

Question 25

You work as a security manager for BlueWell Inc. You are going through the NIST SP 800-37 C&A methodology, which is based on four well defined phases. In which of the following phases of NIST SP 800-37 C&A methodology does the security categorization occur?

Options:

A.

Security Accreditation

B.

Security Certification

C.

Continuous Monitoring

D.

Initiation

Question 26

Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?

Options:

A.

FITSAF

B.

FIPS

C.

TCSEC

D.

SSAA

Question 27

Which of the following security models characterizes the rights of each subject with respect to every object in the computer system?

Options:

A.

Clark-Wilson model

B.

Bell-LaPadula model

C.

Biba model

D.

Access matrix

Question 28

Drag and drop the appropriate principle documents in front of their respective functions.

Options:

Question 29

Which of the following phases of the DITSCAP C&A process is used to define the C&A level of effort, to identify the main C&A roles and responsibilities, and to create an agreement on the method for implementing the security requirements?

Options:

A.

Phase 1

B.

Phase 4

C.

Phase 2

D.

Phase 3

Question 30

Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Kernel flaws

B.

Information system architectures

C.

Race conditions

D.

File and directory permissions

E.

Buffer overflows

F.

Trojan horses

G.

Social engineering

Question 31

Which of the following vulnerabilities occurs when an application directly uses or concatenates potentially hostile input with data file or stream functions?

Options:

A.

Insecure cryptographic storage

B.

Malicious file execution

C.

Insecure communication

D.

Injection flaw

Question 32

Which of the following terms ensures that no intentional or unintentional unauthorized modification is made to data?

Options:

A.

Non-repudiation

B.

Integrity

C.

Authentication

D.

Confidentiality

Question 33

Which of the following ISO standards provides guidelines for accreditation of an organization that is concerned with certification and registration related to ISMS?

Options:

A.

ISO 27006

B.

ISO 27005

C.

ISO 27003

D.

ISO 27004

Question 34

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

Options:

A.

Cryptographer

B.

Cryptography

C.

Kerberos

D.

Cryptanalysis

Question 35

Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?

Options:

A.

DDoS attack

B.

Evasion attack

C.

Insertion attack

D.

Dictionary attack

Question 36

Which of the following is a malicious exploit of a website, whereby unauthorized commands are transmitted from a user trusted by the website?

Options:

A.

Cross-Site Scripting

B.

Injection flaw

C.

Side channel attack

D.

Cross-Site Request Forgery

Question 37

The organization level is the Tier 1 and it addresses risks from an organizational perspective. What are the various Tier 1 activities? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The organization plans to use the degree and type of oversight, to ensure that the risk management strategy is being effectively carried out.

B.

The level of risk tolerance.

C.

The techniques and methodologies an organization plans to employ, to evaluate information system-related security risks.

D.

The RMF primarily operates at Tier 1.

Question 38

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of In order to do so, he performs the following steps of the pre-attack phase successfully: Information gathering Determination of network range Identification of active systems Location of open ports and applications Now, which of the following tasks should he perform next?

Options:

A.

Perform OS fingerprinting on the We-are-secure network.

B.

Map the network of We-are-secure Inc.

C.

Install a backdoor to log in remotely on the We-are-secure server.

D.

Fingerprint the services running on the we-are-secure network.

Question 39

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?

Options:

A.

Configuration Identification

B.

Configuration Verification and Auditing

C.

Configuration Status Accounting

D.

Configuration Item Costing

Question 40

You work as a Security Manager for Tech Perfect Inc. You have set up a SIEM server for the following purposes: Analyze the data from different log sources Correlate the events among the log entries Identify and prioritize significant events Initiate responses to events if required One of your log monitoring staff wants to know the features of SIEM product that will help them in these purposes. What features will you recommend? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Asset information storage and correlation

B.

Transmission confidentiality protection

C.

Incident tracking and reporting

D.

Security knowledge base

E.

Graphical user interface

Question 41

You work as a project manager for BlueWell Inc. You with your team are using a method or a (technical) process that conceives the risks even if all theoretically possible safety measures would be applied. One of your team member wants to know that what is a residual risk. What will you reply to your team member?

Options:

A.

It is a risk that remains because no risk response is taken.

B.

It is a risk that can not be addressed by a risk response.

C.

It is a risk that will remain no matter what type of risk response is offered.

D.

It is a risk that remains after planned risk responses are taken.

Question 42

Martha registers a domain named Microsoft.in. She tries to sell it to Microsoft Corporation. The infringement of which of the following has she made?

Options:

A.

Copyright

B.

Trademark

C.

Patent

D.

Intellectual property

Question 43

You work as a Network Auditor for Net Perfect Inc. The company has a Windows-based network. While auditing the company's network, you are facing problems in searching the faults and other entities that belong to it. Which of the following risks may occur due to the existence of these problems?

Options:

A.

Residual risk

B.

Secondary risk

C.

Detection risk

D.

Inherent risk

Question 44

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).

B.

An ISSE provides advice on the continuous monitoring of the information system.

C.

An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).

D.

An ISSE provides advice on the impacts of system changes. E. An ISSO takes part in the development activities that are required to implement system changes.

Question 45

Which of the following areas of information system, as separated by Information Assurance Framework, is a collection of local computing devices, regardless of physical location, that are interconnected via local area networks (LANs) and governed by a single security policy?

Options:

A.

Local Computing Environments

B.

Networks and Infrastructures

C.

Supporting Infrastructures

D.

Enclave Boundaries

Question 46

You work as a project manager for a company. The company has started a new security software project. The software configuration management will be used throughout the lifecycle of the project. You are tasked to modify the functional features and the basic logic of the software and then make them compatible to the initial design of the project. Which of the following procedures of the configuration management will you follow to accomplish the task?

Options:

A.

Configuration status accounting

B.

Configuration control

C.

Configuration audits

D.

Configuration identification

Question 47

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

Options:

A.

Espionage law

B.

Trademark law

C.

Cyber law

D.

Copyright law

Question 48

You work as a project manager for BlueWell Inc. You are working on a project and the management wants a rapid and cost-effective means for establishing priorities for planning risk responses in your project. Which risk management process can satisfy management's objective for your project?

Options:

A.

Qualitative risk analysis

B.

Historical information

C.

Rolling wave planning

D.

Quantitative analysis

Question 49

The IAM/CA makes certification accreditation recommendations to the DAA. The DAA issues accreditation determinations. Which of the following are the accreditation determinations issued by the DAA? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

IATT

B.

IATO

C.

DATO

D.

ATO

E.

ATT

Question 50

You work as a Security Manager for Tech Perfect Inc. In the organization, Syslog is used for computer system management and security auditing, as well as for generalized informational, analysis, and debugging messages. You want to prevent a denial of service (DoS) for the Syslog server and the loss of Syslog messages from other sources. What will you do to accomplish the task?

Options:

A.

Use a different message format other than Syslog in order to accept data.

B.

Enable the storage of log entries in both traditional Syslog files and a database.

C.

Limit the number of Syslog messages or TCP connections from a specific source for a certain time period.

D.

Encrypt rotated log files automatically using third-party or OS mechanisms.

Question 51

Which of the following is a name, symbol, or slogan with which a product is identified?

Options:

A.

Trademark

B.

Copyright

C.

Trade secret

D.

Patent

Question 52

Which of the following statements about the availability concept of Information security management is true?

Options:

A.

It ensures that modifications are not made to data by unauthorized personnel or processes.

B.

It determines actions and behaviors of a single individual within a system.

C.

It ensures reliable and timely access to resources.

D.

It ensures that unauthorized modifications are not made to data by authorized personnel or processes.

Page: 1 / 13
Total 349 questions