Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CSSLP Exam Dumps - ISC certification Questions and Answers

Question # 24

Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution. Choose three.

Options:

A.

It ensures that unauthorized modifications are not made to data by authorized personnel or processes.

B.

It determines the actions and behaviors of a single individual within a system

C.

It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.

D.

It ensures that modifications are not made to data by unauthorized personnel or processes.

Buy Now
Question # 25

Which of the following statements about a host-based intrusion prevention system (HIPS) are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It can detect events scattered over the network.

B.

It is a technique that allows multiple computers to share one or more IP addresses.

C.

It can handle encrypted and unencrypted traffic equally.

D.

It cannot detect events scattered over the network.

Buy Now
Question # 26

Which of the following is NOT a responsibility of a data owner?

Options:

A.

Approving access requests

B.

Ensuring that the necessary security controls are in place

C.

Delegating responsibility of the day-to-day maintenance of the data protection mechanisms to the data custodian

D.

Maintaining and protecting data

Buy Now
Question # 27

Which of the following is used by attackers to record everything a person types, including usernames, passwords, and account information?

Options:

A.

Packet sniffing

B.

Keystroke logging

C.

Spoofing

D.

Wiretapping

Buy Now
Question # 28

You are the project manager of QSL project for your organization. You are working with your project team and several key stakeholders to create a diagram that shows how various elements of a system interrelate and the mechanism of causation within the system. What diagramming technique are you using as a part of the risk identification process?

Options:

A.

Cause and effect diagrams

B.

Influence diagrams

C.

Predecessor and successor diagramming

D.

System or process flowcharts

Buy Now
Question # 29

Which of the following are the primary functions of configuration management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It removes the risk event entirely by adding additional steps to avoid the event.

B.

It ensures that the change is implemented in a sequential manner through formalized testing.

C.

It reduces the negative impact that the change might have had on the computing services and resources.

D.

It analyzes the effect of the change that is implemented on the system.

Buy Now
Question # 30

Companies use some special marks to distinguish their products from those of other companies. These marks can include words, letters, numbers, drawings, etc. Which of the following terms describes these special marks?

Options:

A.

Business mark

B.

Trademark

C.

Sales mark

D.

Product mark

Buy Now
Question # 31

Which of the following ISO standards provides guidelines for accreditation of an organization that is concerned with certification and registration related to ISMS?

Options:

A.

ISO 27006

B.

ISO 27005

C.

ISO 27003

D.

ISO 27004

Buy Now
Question # 32

Which of the following are the scanning methods used in penetration testing? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Vulnerability

B.

Port

C.

Services

D.

Network

Buy Now
Question # 33

Billy is the project manager of the HAR Project and is in month six of the project. The project is scheduled to last for 18 months. Management asks Billy how often the project team is participating in risk reassessment in this project. What should Billy tell management if he's following the best practices for risk management?

Options:

A.

Project risk management happens at every milestone.

B.

Project risk management has been concluded with the project planning.

C.

Project risk management is scheduled for every month in the 18-month project.

D.

At every status meeting the project team project risk management is an agenda item.

Buy Now
Exam Code: CSSLP
Exam Name: Certified Secure Software Lifecycle Professional
Last Update: Feb 22, 2025
Questions: 0
CSSLP pdf

CSSLP PDF

$25.5  $84.99
CSSLP Engine

CSSLP Testing Engine

$28.5  $94.99
CSSLP PDF + Engine

CSSLP PDF + Testing Engine

$255  $850