Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ISC CSSLP Actual Questions

Page: 6 / 13
Total 349 questions

Certified Secure Software Lifecycle Professional Questions and Answers

Question 21

System Authorization is the risk management process. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization Process. What are the different phases of System Authorization Plan? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Post-certification

B.

Post-Authorization

C.

Authorization

D.

Pre-certification

E.

Certification

Question 22

Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.

Options:

A.

Password policies

B.

Data classification

C.

Data encryption

D.

Vulnerability assessments

Question 23

You work as a Security Manager for Tech Perfect Inc. The company has a Windows based network. It is required to determine compatibility of the systems with custom applications. Which of the following techniques will you use to accomplish the task?

Options:

A.

Safe software storage

B.

Antivirus management

C.

Backup control

D.

Software testing

Question 24

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy?

Options:

A.

Common data security architecture (CDSA)

B.

Application program interface (API)

C.

Trusted computing base (TCB)

D.

Internet Protocol Security (IPSec)

Page: 6 / 13
Total 349 questions