Weekend Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

ISC CSSLP Certified Secure Software Lifecycle Professional Exam Practice Test

Page: 1 / 35
Total 349 questions

Certified Secure Software Lifecycle Professional Questions and Answers

Question 1

Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Editor

B.

Custodian

C.

Owner

D.

User

E.

Security auditor

Question 2

Which of the following methods does the Java Servlet Specification v2.4 define in the HttpServletRequest interface that control programmatic security? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

getCallerIdentity()

B.

isUserInRole()

C.

getUserPrincipal()

D.

getRemoteUser()

Question 3

Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive Branch agencies?

Options:

A.

OMB

B.

NIST

C.

NSA/CSS

D.

DCAA

Question 4

Della work as a project manager for BlueWell Inc. A threat with a dollar value of $250,000 is expected to happen in her project and the frequency of threat occurrence per year is 0.01. What will be the annualized loss expectancy in her project?

Options:

A.

$2,000

B.

$2,500

C.

$3,510

D.

$3,500

Question 5

The organization level is the Tier 1 and it addresses risks from an organizational perspective. What are the various Tier 1 activities? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The organization plans to use the degree and type of oversight, to ensure that the risk management strategy is being effectively carried out.

B.

The level of risk tolerance.

C.

The techniques and methodologies an organization plans to employ, to evaluate information system-related security risks.

D.

The RMF primarily operates at Tier 1.

Question 6

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

Options:

A.

A-rated

B.

B-rated

C.

D-rated

D.

C-rated

Question 7

You work as a systems engineer for BlueWell Inc. Which of the following tools will you use to look outside your own organization to examine how others achieve their performance levels, and what processes they use to reach those levels?

Options:

A.

Benchmarking

B.

Six Sigma

C.

ISO 9001:2000

D.

SEI-CMM

Question 8

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls?

Options:

A.

Information Assurance (IA)

B.

Information systems security engineering (ISSE)

C.

Certification and accreditation (C&A)

D.

Risk Management

Question 9

There are seven risks responses that a project manager can choose from. Which risk response is appropriate for both positive and negative risk events?

Options:

A.

Acceptance

B.

Transference

C.

Sharing

D.

Mitigation

Question 10

According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

VI Vulnerability and Incident Management

B.

Information systems acquisition, development, and maintenance

C.

DC Security Design & Configuration

D.

EC Enclave and Computing Environment

Question 11

The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Architectural components abstraction

B.

SOA value proposition

C.

Business traceability

D.

Disaster recovery planning

E.

Software assets reuse

Question 12

The LeGrand Vulnerability-Oriented Risk Management method is based on vulnerability analysis and consists of four principle steps. Which of the following processes does the risk assessment step include? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Remediation of a particular vulnerability

B.

Cost-benefit examination of countermeasures

C.

Identification of vulnerabilities

D.

Assessment of attacks

Question 13

Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject?

Options:

A.

Take-Grant Protection Model

B.

Biba Integrity Model

C.

Bell-LaPadula Model

D.

Access Matrix

Question 14

Which of the following coding practices are helpful in simplifying code? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Programmers should use multiple small and simple functions rather than a single complex function.

B.

Software should avoid ambiguities and hidden assumptions, recursions, and GoTo statements. C. Programmers should implement high-consequence functions in minimum required lines of code and follow proper coding standards.

C.

Processes should have multiple entry and exit points.

Question 15

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

Options:

A.

Espionage law

B.

Trademark law

C.

Cyber law

D.

Copyright law

Question 16

What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?

Options:

A.

Project Management Information System

B.

Integrated Change Control

C.

Configuration Management System

D.

Scope Verification

Question 17

Which of the following are examples of the application programming interface (API)? Each correct answer represents a complete solution. Choose three.

Options:

A.

HTML

B.

PHP

C.

.NET

D.

Perl

Question 18

Which of the following attacks causes software to fail and prevents the intended users from accessing software?

Options:

A.

Enabling attack

B.

Reconnaissance attack

C.

Sabotage attack

D.

Disclosure attack

Question 19

The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to obtain a fully integrated system for certification testing and accreditation. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Certification analysis

B.

Assessment of the Analysis Results

C.

Configuring refinement of the SSAA

D.

System development

E.

Registration

Question 20

John works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cost effective DRP testing plan. According to you, which of the following disaster recovery testing plans is the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises?

Options:

A.

Full-scale exercise

B.

Walk-through drill

C.

Structured walk-through test

D.

Evacuation drill

Question 21

Which of the following NIST Special Publication documents provides a guideline on questionnaires and checklists through which systems can be evaluated for compliance against specific control objectives?

Options:

A.

NIST SP 800-37

B.

NIST SP 800-26

C.

NIST SP 800-53A

D.

NIST SP 800-59

E.

NIST SP 800-53

F.

NIST SP 800-60

Question 22

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. You have searched all open ports of the we-are-secure server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting. Which of the following tools can you use to accomplish the task?

Options:

A.

Superscan

B.

NBTscan

C.

Nmap

D.

P0f

Question 23

Which of the following processes identifies the threats that can impact the business continuity of operations?

Options:

A.

Function analysis

B.

Risk analysis

C.

Business impact analysis

D.

Requirement analysis

Question 24

Which of the following elements sets up a requirement to receive the constrained requests over a protected layer connection, such as TLS (Transport Layer Security)?

Options:

A.

User data constraint

B.

Authorization constraint

C.

Web resource collection

D.

Accounting constraint

Question 25

Fill in the blank with an appropriate phrase. A is defined as any activity that has an effect on defining, designing, building, or executing a task, requirement, or procedure.

Options:

A.

technical effort

Question 26

Which of the following are the important areas addressed by a software system's security policy? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Identification and authentication

B.

Punctuality

C.

Data protection

D.

Accountability

E.

Scalability

F.

Access control

Question 27

Single Loss Expectancy (SLE) represents an organization's loss from a single threat. Which of the following formulas best describes the Single Loss Expectancy (SLE)?

Options:

A.

SLE = Asset Value (AV) * Exposure Factor (EF)

B.

SLE = Annualized Loss Expectancy (ALE) * Annualized Rate of Occurrence (ARO)

C.

SLE = Annualized Loss Expectancy (ALE) * Exposure Factor (EF)

D.

SLE = Asset Value (AV) * Annualized Rate of Occurrence (ARO)

Question 28

The mission and business process level is the Tier 2. What are the various Tier 2 activities? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Developing an organization-wide information protection strategy and incorporating high-level information security requirements

B.

Defining the types of information that the organization needs, to successfully execute the stated missions and business processes

C.

Specifying the degree of autonomy for the subordinate organizations

D.

Defining the core missions and business processes for the organization

E.

Prioritizing missions and business processes with respect to the goals and objectives of the organization

Question 29

Which of the following ISO standards is entitled as "Information technology - Security techniques - Information security management - Measurement"?

Options:

A.

ISO 27003

B.

ISO 27005

C.

ISO 27004

D.

ISO 27006

Question 30

You are the project manager for a construction project. The project involves casting of a column in a very narrow space. Because of lack of space, casting it is highly dangerous. High technical skill will be required for casting that column. You decide to hire a local expert team for casting that column. Which of the following types of risk response are you following?

Options:

A.

Avoidance

B.

Acceptance

C.

Mitigation

D.

Transference

Question 31

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

Options:

A.

SNMP enumeration

B.

IIS buffer overflow

C.

NetBIOS NULL session

D.

DNS zone transfer

Question 32

Which of the following US Acts emphasized a "risk-based policy for cost-effective security" and makes mandatory for agency program officials, chief information officers, and inspectors general (IGs) to conduct annual reviews of the agency's information security program and report the results to Office of Management and Budget?

Options:

A.

Federal Information Security Management Act of 2002 (FISMA)

B.

The Electronic Communications Privacy Act of 1986 (ECPA)

C.

The Equal Credit Opportunity Act (ECOA)

D.

The Fair Credit Reporting Act (FCRA)

Question 33

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

Options:

A.

Integrity

B.

Availability

C.

Non-repudiation

D.

Confidentiality

Question 34

Which of the following terms refers to the protection of data against unauthorized access?

Options:

A.

Integrity

B.

Recovery

C.

Auditing

D.

Confidentiality

Question 35

To help review or design security controls, they can be classified by several criteria. One of these criteria is based on time. According to this criteria, which of the following controls are intended to prevent an incident from occurring?

Options:

A.

Corrective controls

B.

Adaptive controls

C.

Detective controls

D.

Preventive controls

Question 36

Which of the following are the basic characteristics of declarative security? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is a container-managed security.

B.

It has a runtime environment.

C.

All security constraints are stated in the configuration files.

D.

The security policies are applied at the deployment time.

Question 37

The Data and Analysis Center for Software (DACS) specifies three general principles for software assurance which work as a framework in order to categorize various secure design principles. Which of the following principles and practices does the General Principle 1 include? Each correct answer represents a complete solution. Choose two.

Options:

A.

Principle of separation of privileges, duties, and roles

B.

Assume environment data is not trustworthy

C.

Simplify the design

D.

Principle of least privilege

Question 38

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Change and Configuration Control

B.

Security Certification and Accreditation (C&A)

C.

Vulnerability Assessment and Penetration Testing

D.

Risk Adjustments

Question 39

Which of the following statements about the authentication concept of information security management is true?

Options:

A.

It establishes the users' identity and ensures that the users are who they say they are.

B.

It ensures the reliable and timely access to resources.

C.

It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.

D.

It ensures that modifications are not made to data by unauthorized personnel or processes.

Question 40

Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.

Options:

A.

Password policies

B.

Data classification

C.

Data encryption

D.

Vulnerability assessments

Question 41

Which of the following federal agencies has the objective to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life?

Options:

A.

National Security Agency (NSA)

B.

National Institute of Standards and Technology (NIST)

C.

United States Congress

D.

Committee on National Security Systems (CNSS)

Question 42

Drag and drop the appropriate principle documents in front of their respective functions.

Question # 42

Options:

Question 43

In which of the following DIACAP phases is residual risk analyzed?

Options:

A.

Phase 1

B.

Phase 5

C.

Phase 2

D.

Phase 4

E.

Phase 3

Question 44

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

Options:

A.

Spoofing

B.

Brute force attack

C.

SYN attack

D.

PING attack

Question 45

NIST SP 800-53A defines three types of interview depending on the level of assessment conducted. Which of the following NIST SP 800-53A interviews consists of informal and ad hoc interviews?

Options:

A.

Comprehensive

B.

Significant

C.

Abbreviated

D.

Substantial

Question 46

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy?

Options:

A.

Common data security architecture (CDSA)

B.

Application program interface (API)

C.

Trusted computing base (TCB)

D.

Internet Protocol Security (IPSec)

Question 47

Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?

Options:

A.

Contingency plan

B.

Business continuity plan

C.

Crisis communication plan

D.

Disaster recovery plan

Question 48

Digital rights management (DRM) consists of compliance and robustness rules. Which of the following features does the robustness rule have? Each correct answer represents a complete solution. Choose three.

Options:

A.

It specifies the various levels of robustness that are needed for asset security.

B.

It specifies minimum techniques for asset security.

C.

It specifies the behaviors of the DRM implementation and applications accessing the implementation.

D.

It contains assets, such as device key, content key, algorithm, and profiling data.

Question 49

Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

Options:

A.

Valuations of the critical assets in hard costs.

B.

Evaluate potential threats to the assets.

C.

Estimate the potential losses to assets by determining their value.

D.

Establish the threats likelihood and regularity.

Question 50

Fred is the project manager of the CPS project. He is working with his project team to prioritize the identified risks within the CPS project. He and the team are prioritizing risks for further analysis or action by assessing and combining the risks probability of occurrence and impact. What process is Fred completing?

Options:

A.

Risk identification

B.

Risk Breakdown Structure creation

C.

Perform qualitative analysis

D.

Perform quantitative analysis

Question 51

Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?

Options:

A.

FITSAF

B.

FIPS

C.

TCSEC

D.

SSAA

Question 52

Which of the following are the principle duties performed by the BIOS during POST (power-on-self-test)? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

It provides a user interface for system's configuration.

B.

It identifies, organizes, and selects boot devices.

C.

It delegates control to other BIOS, if it is required.

D.

It discovers size and verifies system memory.

E.

It verifies the integrity of the BIOS code itself.

F.

It interrupts the execution of all running programs.

Page: 1 / 35
Total 349 questions