Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Complete CSSLP ISC Materials

Page: 8 / 13
Total 349 questions

Certified Secure Software Lifecycle Professional Questions and Answers

Question 29

Which of the following phases of the DITSCAP C&A process is used to define the C&A level of effort, to identify the main C&A roles and responsibilities, and to create an agreement on the method for implementing the security requirements?

Options:

A.

Phase 1

B.

Phase 4

C.

Phase 2

D.

Phase 3

Question 30

Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Kernel flaws

B.

Information system architectures

C.

Race conditions

D.

File and directory permissions

E.

Buffer overflows

F.

Trojan horses

G.

Social engineering

Question 31

Which of the following vulnerabilities occurs when an application directly uses or concatenates potentially hostile input with data file or stream functions?

Options:

A.

Insecure cryptographic storage

B.

Malicious file execution

C.

Insecure communication

D.

Injection flaw

Question 32

Which of the following terms ensures that no intentional or unintentional unauthorized modification is made to data?

Options:

A.

Non-repudiation

B.

Integrity

C.

Authentication

D.

Confidentiality

Page: 8 / 13
Total 349 questions