Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ISC certification CSSLP Dumps PDF

Page: 10 / 13
Total 349 questions

Certified Secure Software Lifecycle Professional Questions and Answers

Question 37

The organization level is the Tier 1 and it addresses risks from an organizational perspective. What are the various Tier 1 activities? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The organization plans to use the degree and type of oversight, to ensure that the risk management strategy is being effectively carried out.

B.

The level of risk tolerance.

C.

The techniques and methodologies an organization plans to employ, to evaluate information system-related security risks.

D.

The RMF primarily operates at Tier 1.

Question 38

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of In order to do so, he performs the following steps of the pre-attack phase successfully: Information gathering Determination of network range Identification of active systems Location of open ports and applications Now, which of the following tasks should he perform next?

Options:

A.

Perform OS fingerprinting on the We-are-secure network.

B.

Map the network of We-are-secure Inc.

C.

Install a backdoor to log in remotely on the We-are-secure server.

D.

Fingerprint the services running on the we-are-secure network.

Question 39

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?

Options:

A.

Configuration Identification

B.

Configuration Verification and Auditing

C.

Configuration Status Accounting

D.

Configuration Item Costing

Question 40

You work as a Security Manager for Tech Perfect Inc. You have set up a SIEM server for the following purposes: Analyze the data from different log sources Correlate the events among the log entries Identify and prioritize significant events Initiate responses to events if required One of your log monitoring staff wants to know the features of SIEM product that will help them in these purposes. What features will you recommend? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Asset information storage and correlation

B.

Transmission confidentiality protection

C.

Incident tracking and reporting

D.

Security knowledge base

E.

Graphical user interface

Page: 10 / 13
Total 349 questions