Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CSSLP Exam Dumps - Certified Secure Software Lifecycle Professional

Question # 4

In which of the following deployment models of cloud is the cloud infrastructure operated exclusively for an organization?

A.

Public cloud

B.

Community cloud

C.

Private cloud

D.

Hybrid cloud

Full Access
Question # 5

Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.

A.

File and object access

B.

Data downloading from the Internet

C.

Printer access

D.

Network logons and logoffs

Full Access
Question # 6

Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?

A.

Business continuity plan development

B.

Business impact assessment

C.

Scope and plan initiation

D.

Plan approval and implementation

Full Access
Question # 7

Which of the following specifies the behaviors of the DRM implementation and any applications that are accessing the implementation?

A.

OS fingerprinting

B.

OTA provisioning

C.

Access control

D.

Compliance rule

Full Access
Question # 8

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy?

A.

Common data security architecture (CDSA)

B.

Application program interface (API)

C.

Trusted computing base (TCB)

D.

Internet Protocol Security (IPSec)

Full Access
Question # 9

A number of security patterns for Web applications under the DARPA contract have been developed by Kienzle, Elder, Tyree, and Edwards-Hewitt. Which of the following patterns are applicable to aspects of authentication in Web applications?b Each correct answer represents a complete solution. Choose all that apply.

A.

Authenticated session

B.

Secure assertion

C.

Partitioned application

D.

Password authentication

E.

Account lockout

F.

Password propagation

Full Access
Question # 10

Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

A.

Valuations of the critical assets in hard costs.

B.

Evaluate potential threats to the assets.

C.

Estimate the potential losses to assets by determining their value.

D.

Establish the threats likelihood and regularity.

Full Access
Question # 11

Which of the following provides an easy way to programmers for writing lower-risk applications and retrofitting security into an existing application?

A.

Watermarking

B.

ESAPI

C.

Encryption wrapper

D.

Code obfuscation

Full Access
Question # 12

Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the international information security standards? Each correct answer represents a complete solution. Choose all that apply.

A.

AU audit and accountability

B.

Human resources security

C.

Organization of information security

D.

Risk assessment and treatment

Full Access
Question # 13

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

A.

Sensitive

B.

Private

C.

Unclassified

D.

Confidential

E.

Secret

F.

Public

Full Access
Question # 14

Which of the following governance bodies directs and coordinates implementations of the information security program?

A.

Chief Information Security Officer

B.

Information Security Steering Committee

C.

Business Unit Manager

D.

Senior Management

Full Access
Question # 15

Which of the following areas of information system, as separated by Information Assurance Framework, is a collection of local computing devices, regardless of physical location, that are interconnected via local area networks (LANs) and governed by a single security policy?

A.

Local Computing Environments

B.

Networks and Infrastructures

C.

Supporting Infrastructures

D.

Enclave Boundaries

Full Access
Question # 16

ISO 27003 is an information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Which of the following elements does this standard contain? Each correct answer represents a complete solution. Choose all that apply.

A.

Inter-Organization Co-operation

B.

Information Security Risk Treatment

C.

CSFs (Critical success factors)

D.

ystem requirements for certification bodies Managements

E.

Terms and Definitions

F.

Guidance on process approach

Full Access
Question # 17

At which of the following levels of robustness in DRM must the security functions be immune to widely available tools and specialized tools and resistant to professional tools?

A.

Level 2

B.

Level 4

C.

Level 1

D.

Level 3

Full Access
Question # 18

You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?

A.

Availability

B.

Confidentiality

C.

Non repudiation

D.

Data Protection

Full Access
Question # 19

FIPS 199 defines the three levels of potential impact on organizations. Which of the following potential impact levels shows limited adverse effects on organizational operations, organizational assets, or individuals?

A.

Moderate

B.

Low

C.

Medium

D.

High

Full Access
Question # 20

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

A.

Copyright

B.

Snooping

C.

Utility model

D.

Patent

Full Access
Question # 21

Fill in the blank with an appropriate phrase. models address specifications, requirements, design, verification and validation, and maintenance activities. A. Life cycle

Full Access
Question # 22

Which of the following process areas does the SSE-CMM define in the 'Project and Organizational Practices' category? Each correct answer represents a complete solution. Choose all that apply.

A.

Provide Ongoing Skills and Knowledge

B.

Verify and Validate Security

C.

Manage Project Risk

D.

Improve Organization's System Engineering Process

Full Access
Question # 23

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE? Each correct answer represents a complete solution. Choose all that apply.

A.

An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).

B.

An ISSE provides advice on the continuous monitoring of the information system.

C.

An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).

D.

An ISSE provides advice on the impacts of system changes. E. An ISSO takes part in the development activities that are required to implement system changes.

Full Access
Question # 24

Which of the following secure coding principles and practices defines the appearance of code listing so that a code reviewer and maintainer who have not written that code can easily understand it?

A.

Make code forward and backward traceable

B.

Review code during and after coding

C.

Use a consistent coding style

D.

Keep code simple and small

Full Access
Question # 25

Which of the following access control models are used in the commercial sector? Each correct answer represents a complete solution. Choose two.

A.

Biba model

B.

Clark-Biba model

C.

Clark-Wilson model

D.

Bell-LaPadula model

Full Access
Question # 26

The IAM/CA makes certification accreditation recommendations to the DAA. The DAA issues accreditation determinations. Which of the following are the accreditation determinations issued by the DAA? Each correct answer represents a complete solution. Choose all that apply.

A.

IATT

B.

IATO

C.

DATO

D.

ATO

E.

ATT

Full Access
Question # 27

To help review or design security controls, they can be classified by several criteria . One of these criteria is based on their nature. According to this criterion, which of the following controls consists of incident response processes, management oversight, security awareness, and training?

A.

Compliance control

B.

Physical control

C.

Procedural control

D.

Technical control

Full Access
Question # 28

Which of the following is a name, symbol, or slogan with which a product is identified?

A.

Trademark

B.

Copyright

C.

Trade secret

D.

Patent

Full Access
Question # 29

You work as a Security Manager for Tech Perfect Inc. You find that some applications have failed to encrypt network traffic while ensuring secure communications in the organization. Which of the following will you use to resolve the issue?

A.

SCP

B.

TLS

C.

IPSec

D.

HTTPS

Full Access
Question # 30

Which of the following characteristics are described by the DIAP Information Readiness Assessment function? Each correct answer represents a complete solution. Choose all that apply.

A.

It provides for entry and storage of individual system data.

B.

It performs vulnerability/threat analysis assessment.

C.

It provides data needed to accurately assess IA readiness.

D.

It identifies and generates IA requirements.

Full Access
Question # 31

Security controls are safeguards or countermeasures to avoid, counteract, or minimize security risks. Which of the following are types of security controls? Each correct answer represents a complete solution. Choose all that apply.

A.

Common controls

B.

Hybrid controls

C.

Storage controls

D.

System-specific controls

Full Access
Question # 32

Which of the following components of configuration management involves periodic checks to determine the consistency and completeness of accounting information and to verify that all configuration management policies are being followed?

A.

Configuration Identification

B.

Configuration Auditing

C.

Configuration Control

D.

Configuration Status Accounting

Full Access
Question # 33

Which of the following SDLC phases consists of the given security controls: Misuse Case Modeling Security Design and Architecture Review Threat and Risk Modeling Security Requirements and Test Cases Generation?

A.

Deployment

B.

Requirements Gathering

C.

Maintenance

D.

Design

Full Access
Question # 34

Which of the following is an open source network intrusion detection system?

A.

NETSH

B.

Macof

C.

Sourcefire

D.

Snort

Full Access
Question # 35

Fill in the blank with the appropriate security mechanism. is a computer hardware mechanism or programming language construct which handles the occurrence of exceptional events.

A.

Exception handling

Full Access
Question # 36

Which of the following is a malicious exploit of a website, whereby unauthorized commands are transmitted from a user trusted by the website?

A.

Cross-Site Scripting

B.

Injection flaw

C.

Side channel attack

D.

Cross-Site Request Forgery

Full Access
Question # 37

Which of the following specifies access privileges to a collection of resources by using the URL mapping?

A.

Code Access Security

B.

Security constraint

C.

Configuration Management

D.

Access Management

Full Access
Question # 38

Which of the following authentication methods is used to access public areas of a Web site?

A.

Anonymous authentication

B.

Biometrics authentication

C.

Mutual authentication

D.

Multi-factor authentication

Full Access
Question # 39

The LeGrand Vulnerability-Oriented Risk Management method is based on vulnerability analysis and consists of four principle steps. Which of the following processes does the risk assessment step include? Each correct answer represents a part of the solution. Choose all that apply.

A.

Remediation of a particular vulnerability

B.

Cost-benefit examination of countermeasures

C.

Identification of vulnerabilities

D.

Assessment of attacks

Full Access
Question # 40

Which of the following DoD directives defines DITSCAP as the standard C&A process for the Department of Defense?

A.

DoD 8910.1

B.

DoD 5200.22-M

C.

DoD 8000.1

D.

DoD 5200.40

Full Access
Question # 41

Which of the following plans is a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources?

A.

Contingency plan

B.

Continuity of Operations plan

C.

Disaster recovery plan

D.

Business Continuity plan

Full Access
Question # 42

Fill in the blank with an appropriate security type. applies the internal security policies of the software applications when they are deployed.

A.

Programmatic security

Full Access
Question # 43

What NIACAP certification levels are recommended by the certifier? Each correct answer represents a complete solution. Choose all that apply.

A.

Comprehensive Analysis

B.

Maximum Analysis

C.

Detailed Analysis

D.

Minimum Analysis

E.

Basic Security Review

F.

Basic System Review

Full Access
Question # 44

The service-oriented modeling framework (SOMF) introduces five major life cycle modeling activities that drive a service evolution during design-time and run-time. Which of the following activities integrates SOA software assets and establishes SOA logical environment dependencies?

A.

Service-oriented discovery and analysis modeling

B.

Service-oriented business integration modeling

C.

Service-oriented logical architecture modeling

D.

Service-oriented logical design modeling

Full Access
Question # 45

The rights of an author or a corporation to make profit from the creation of their products (such as software, music, etc.) are protected by the Intellectual Property law. Which of the following are the components of the Intellectual Property law? Each correct answer represents a part of the solution. Choose two.

A.

Trademark law

B.

Industrial Property law

C.

Copyright law

D.

Patent law

Full Access
Question # 46

Which of the following are the important areas addressed by a software system's security policy? Each correct answer represents a complete solution. Choose all that apply.

A.

Identification and authentication

B.

Punctuality

C.

Data protection

D.

Accountability

E.

Scalability

F.

Access control

Full Access
Question # 47

FIPS 199 defines the three levels of potential impact on organizations: low, moderate, and high. Which of the following are the effects of loss of confidentiality, integrity, or availability in a high level potential impact?

A.

The loss of confidentiality, integrity, or availability might result in a major damage to organizational assets.

B.

The loss of confidentiality, integrity, or availability might result in severe damages like life threatening injuries or loss of life.

C.

The loss of confidentiality, integrity, or availability might result in major financial losses.

D.

The loss of confidentiality, integrity, or availability might cause severe degradation in or loss of mission capability to an extent.

Full Access
Question # 48

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

A.

Evasion attack

B.

Fragmentation overlap attack

C.

Fragmentation overwrite attack

D.

Insertion attack

Full Access
Question # 49

Which of the following is a patch management utility that scans one or more computers on a network and alerts a user if any important Microsoft security patches are missing and also provides links that enable those missing patches to be downloaded and installed?

A.

MABS

B.

ASNB

C.

MBSA

D.

IDMS

Full Access
Question # 50

Which of the following phases of DITSCAP includes the activities that are necessary for the continuing operation of an accredited IT system in its computing environment and for addressing the changing threats that a system faces throughout its life cycle?

A.

Phase 3, Validation

B.

Phase 1, Definition

C.

Phase 2, Verification

D.

Phase 4, Post Accreditation Phase

Full Access
Question # 51

Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive Branch agencies?

A.

OMB

B.

NIST

C.

NSA/CSS

D.

DCAA

Full Access
Question # 52

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

A.

A-rated

B.

B-rated

C.

D-rated

D.

C-rated

Full Access