Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CSSLP Exam Dumps - ISC certification Questions and Answers

Question # 14

Which of the following federal agencies has the objective to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life?

Options:

A.

National Security Agency (NSA)

B.

National Institute of Standards and Technology (NIST)

C.

United States Congress

D.

Committee on National Security Systems (CNSS)

Buy Now
Question # 15

Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.

Options:

A.

File and object access

B.

Data downloading from the Internet

C.

Printer access

D.

Network logons and logoffs

Buy Now
Question # 16

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Options:

A.

Single Loss Expectancy (SLE)

B.

Annualized Rate of Occurrence (ARO)

C.

Safeguard

D.

Exposure Factor (EF)

Buy Now
Question # 17

Which of the following models manages the software development process if the developers are limited to go back only one stage to rework?

Options:

A.

Waterfall model

B.

Spiral model

C.

RAD model

D.

Prototyping model

Buy Now
Question # 18

Which of the following are the tasks performed by the owner in the information classification schemes? Each correct answer represents a part of the solution. Choose three.

Options:

A.

To make original determination to decide what level of classification the information requires, which is based on the business requirements for the safety of the data.

B.

To review the classification assignments from time to time and make alterations as the business requirements alter.

C.

To perform data restoration from the backups whenever required.

D.

To delegate the responsibility of the data safeguard duties to the custodian.

Buy Now
Question # 19

Security controls are safeguards or countermeasures to avoid, counteract, or minimize security risks. Which of the following are types of security controls? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Common controls

B.

Hybrid controls

C.

Storage controls

D.

System-specific controls

Buy Now
Question # 20

You work as the senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?

Options:

A.

Configuration status accounting

B.

Configuration identification

C.

Configuration auditing

D.

Configuration control

Buy Now
Question # 21

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

Options:

A.

Continuity of Operations Plan

B.

Contingency Plan

C.

Disaster Recovery Plan

D.

Business Continuity Plan

Buy Now
Question # 22

Which of the following techniques is used to identify attacks originating from a botnet?

Options:

A.

Passive OS fingerprinting

B.

Recipient filtering

C.

IFilter

D.

BPF-based filter

Buy Now
Question # 23

Which of the following are the phases of the Certification and Accreditation (C&A) process? Each correct answer represents a complete solution. Choose two.

Options:

A.

Continuous Monitoring

B.

Auditing

C.

Detection

D.

Initiation

Buy Now
Exam Code: CSSLP
Exam Name: Certified Secure Software Lifecycle Professional
Last Update: Feb 22, 2025
Questions: 0
CSSLP pdf

CSSLP PDF

$25.5  $84.99
CSSLP Engine

CSSLP Testing Engine

$28.5  $94.99
CSSLP PDF + Engine

CSSLP PDF + Testing Engine

$255  $850