Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CSSLP Exam Dumps - ISC certification Questions and Answers

Question # 44

Which of the following methods determines the principle name of the current user and returns the jav a.security.Principal object in the HttpServletRequest interface?

Options:

A.

getUserPrincipal()

B.

isUserInRole()

C.

getRemoteUser()

D.

getCallerPrincipal()

Buy Now
Question # 45

Fill in the blank with an appropriate phrase. models address specifications, requirements, design, verification and validation, and maintenance activities. A. Life cycle

Options:

Buy Now
Question # 46

FIPS 199 defines the three levels of potential impact on organizations. Which of the following potential impact levels shows limited adverse effects on organizational operations, organizational assets, or individuals?

Options:

A.

Moderate

B.

Low

C.

Medium

D.

High

Buy Now
Question # 47

You work as a security engineer for BlueWell Inc. Which of the following documents will you use as a guide for the security certification and accreditation of Federal Information Systems?

Options:

A.

NIST Special Publication 800-60

B.

NIST Special Publication 800-53

C.

NIST Special Publication 800-37

D.

NIST Special Publication 800-59

Buy Now
Question # 48

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet?

Options:

A.

DAS

B.

IPsec

C.

IDS

D.

ACL

Buy Now
Question # 49

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Options:

A.

Copyright

B.

Snooping

C.

Utility model

D.

Patent

Buy Now
Question # 50

In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?

Options:

A.

Full operational test

B.

Penetration test

C.

Paper test

D.

Walk-through test

Buy Now
Question # 51

Microsoft software security expert Michael Howard defines some heuristics for determining code review in "A Process for Performing Security Code Reviews". Which of the following heuristics increase the application's attack surface? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Code written in C/C++/assembly language

B.

Code listening on a globally accessible network interface

C.

Code that changes frequently

D.

Anonymously accessible code

E.

Code that runs by default

F.

Code that runs in elevated context

Buy Now
Question # 52

You work as a Security Manager for Tech Perfect Inc. You have set up a SIEM server for the following purposes: Analyze the data from different log sources Correlate the events among the log entries Identify and prioritize significant events Initiate responses to events if required One of your log monitoring staff wants to know the features of SIEM product that will help them in these purposes. What features will you recommend? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Asset information storage and correlation

B.

Transmission confidentiality protection

C.

Incident tracking and reporting

D.

Security knowledge base

E.

Graphical user interface

Buy Now
Question # 53

Audit trail or audit log is a chronological sequence of audit records, each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Under which of the following controls does audit control come?

Options:

A.

Reactive controls

B.

Detective controls

C.

Protective controls

D.

Preventive controls

Buy Now
Exam Code: CSSLP
Exam Name: Certified Secure Software Lifecycle Professional
Last Update: Feb 22, 2025
Questions: 0
CSSLP pdf

CSSLP PDF

$25.5  $84.99
CSSLP Engine

CSSLP Testing Engine

$28.5  $94.99
CSSLP PDF + Engine

CSSLP PDF + Testing Engine

$255  $850