Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

ISC CSSLP Certified Secure Software Lifecycle Professional Exam Practice Test

Page: 1 / 0
Total 0 questions

Certified Secure Software Lifecycle Professional Questions and Answers

Question 1

In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?

Options:

A.

Chosen plaintext attack

B.

Chosen ciphertext attack

C.

Ciphertext only attack

D.

Known plaintext attack

Question 2

Which of the following DITSCAP C&A phases takes place between the signing of the initial version of the SSAA and the formal accreditation of the system?

Options:

A.

Phase 4

B.

Phase 3

C.

Phase 1

D.

Phase 2

Question 3

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of In order to do so, he performs the following steps of the pre-attack phase successfully: Information gathering Determination of network range Identification of active systems Location of open ports and applications Now, which of the following tasks should he perform next?

Options:

A.

Perform OS fingerprinting on the We-are-secure network.

B.

Map the network of We-are-secure Inc.

C.

Install a backdoor to log in remotely on the We-are-secure server.

D.

Fingerprint the services running on the we-are-secure network.

Question 4

According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

VI Vulnerability and Incident Management

B.

Information systems acquisition, development, and maintenance

C.

DC Security Design & Configuration

D.

EC Enclave and Computing Environment

Question 5

The IAM/CA makes certification accreditation recommendations to the DAA. The DAA issues accreditation determinations. Which of the following are the accreditation determinations issued by the DAA? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

IATT

B.

IATO

C.

DATO

D.

ATO

E.

ATT

Question 6

What are the various activities performed in the planning phase of the Software Assurance Acquisition process? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Develop software requirements.

B.

Implement change control procedures.

C.

Develop evaluation criteria and evaluation plan.

D.

Create acquisition strategy.

Question 7

You work as a Network Auditor for Net Perfect Inc. The company has a Windows-based network. While auditing the company's network, you are facing problems in searching the faults and other entities that belong to it. Which of the following risks may occur due to the existence of these problems?

Options:

A.

Residual risk

B.

Secondary risk

C.

Detection risk

D.

Inherent risk

Question 8

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet?

Options:

A.

DAS

B.

IPsec

C.

IDS

D.

ACL

Question 9

An asset with a value of $600,000 is subject to a successful malicious attack threat twice a year. The asset has an exposure of 30 percent to the threat. What will be the annualized loss expectancy?

Options:

A.

$360,000

B.

$180,000

C.

$280,000

D.

$540,000

Question 10

Which of the following phases of DITSCAP includes the activities that are necessary for the continuing operation of an accredited IT system in its computing environment and for addressing the changing threats that a system faces throughout its life cycle?

Options:

A.

Phase 3, Validation

B.

Phase 1, Definition

C.

Phase 2, Verification

D.

Phase 4, Post Accreditation Phase

Question 11

Della work as a project manager for BlueWell Inc. A threat with a dollar value of $250,000 is expected to happen in her project and the frequency of threat occurrence per year is 0.01. What will be the annualized loss expectancy in her project?

Options:

A.

$2,000

B.

$2,500

C.

$3,510

D.

$3,500

Question 12

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

Options:

A.

Quantitative risk analysis

B.

Qualitative risk analysis

C.

Seven risk responses

D.

A risk probability-impact matrix

Question 13

Which of the following penetration testing techniques automatically tests every phone line in an exchange and tries to locate modems that are attached to the network?

Options:

A.

Demon dialing

B.

Sniffing

C.

Social engineering

D.

Dumpster diving

Question 14

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?

Options:

A.

Cold Site

B.

Hot Site

C.

Warm Site

D.

Mobile Site

Question 15

You work as a project manager for BlueWell Inc. You are working on a project and the management wants a rapid and cost-effective means for establishing priorities for planning risk responses in your project. Which risk management process can satisfy management's objective for your project?

Options:

A.

Qualitative risk analysis

B.

Historical information

C.

Rolling wave planning

D.

Quantitative analysis

Question 16

Martha registers a domain named Microsoft.in. She tries to sell it to Microsoft Corporation. The infringement of which of the following has she made?

Options:

A.

Copyright

B.

Trademark

C.

Patent

D.

Intellectual property

Question 17

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).

B.

An ISSE provides advice on the continuous monitoring of the information system.

C.

An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).

D.

An ISSE provides advice on the impacts of system changes. E. An ISSO takes part in the development activities that are required to implement system changes.

Question 18

In which of the following types of tests are the disaster recovery checklists distributed to the members of disaster recovery team and asked to review the assigned checklist?

Options:

A.

Parallel test

B.

Simulation test

C.

Full-interruption test

D.

Checklist test

Question 19

You work as a security manager for BlueWell Inc. You are going through the NIST SP 800-37 C&A methodology, which is based on four well defined phases. In which of the following phases of NIST SP 800-37 C&A methodology does the security categorization occur?

Options:

A.

Security Accreditation

B.

Security Certification

C.

Continuous Monitoring

D.

Initiation

Question 20

Which of the following provides an easy way to programmers for writing lower-risk applications and retrofitting security into an existing application?

Options:

A.

Watermarking

B.

ESAPI

C.

Encryption wrapper

D.

Code obfuscation

Question 21

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

Options:

A.

Spoofing

B.

Brute force attack

C.

SYN attack

D.

PING attack

Question 22

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

Options:

A.

Cryptographer

B.

Cryptography

C.

Kerberos

D.

Cryptanalysis

Question 23

DIACAP applies to the acquisition, operation, and sustainment of any DoD system that collects, stores, transmits, or processes unclassified or classified information since December 1997. What phases are identified by DIACAP? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

System Definition

B.

Validation

C.

Identification

D.

Accreditation

E.

Verification

F.

Re-Accreditation

Question 24

Which of the following refers to a process that is used for implementing information security?

Options:

A.

Classic information security model

B.

Five Pillars model

C.

Certification and Accreditation (C&A)

D.

Information Assurance (IA)

Question 25

Which of the following technologies is used by hardware manufacturers, publishers, copyright holders and individuals to impose limitations on the usage of digital content and devices?

Options:

A.

Hypervisor

B.

Grid computing

C.

Code signing

D.

Digital rights management

Question 26

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

Options:

A.

Continuity of Operations Plan

B.

Contingency Plan

C.

Disaster Recovery Plan

D.

Business Continuity Plan

Question 27

Which of the following federal agencies has the objective to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life?

Options:

A.

National Security Agency (NSA)

B.

National Institute of Standards and Technology (NIST)

C.

United States Congress

D.

Committee on National Security Systems (CNSS)

Question 28

Drag and drop the correct DoD Policy Series at their appropriate places.

Options:

Question 29

What project management plan is most likely to direct the quantitative risk analysis process for a project in a matrix environment?

Options:

A.

Risk analysis plan

B.

Staffing management plan

C.

Risk management plan

D.

Human resource management plan

Question 30

Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

Options:

A.

Valuations of the critical assets in hard costs.

B.

Evaluate potential threats to the assets.

C.

Estimate the potential losses to assets by determining their value.

D.

Establish the threats likelihood and regularity.

Question 31

Fred is the project manager of the CPS project. He is working with his project team to prioritize the identified risks within the CPS project. He and the team are prioritizing risks for further analysis or action by assessing and combining the risks probability of occurrence and impact. What process is Fred completing?

Options:

A.

Risk identification

B.

Risk Breakdown Structure creation

C.

Perform qualitative analysis

D.

Perform quantitative analysis

Question 32

The Data and Analysis Center for Software (DACS) specifies three general principles for software assurance which work as a framework in order to categorize various secure design principles. Which of the following principles and practices does the General Principle 1 include? Each correct answer represents a complete solution. Choose two.

Options:

A.

Principle of separation of privileges, duties, and roles

B.

Assume environment data is not trustworthy

C.

Simplify the design

D.

Principle of least privilege

Question 33

Continuous Monitoring is the fourth phase of the security certification and accreditation process. What activities are performed in the Continuous Monitoring process? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security accreditation decision

B.

Security control monitoring and impact analyses of changes to the information system

C.

Security accreditation documentation

D.

Configuration management and control

E.

Status reporting and documentation

Question 34

Which of the following SDLC phases consists of the given security controls: Misuse Case Modeling Security Design and Architecture Review Threat and Risk Modeling Security Requirements and Test Cases Generation?

Options:

A.

Deployment

B.

Requirements Gathering

C.

Maintenance

D.

Design

Question 35

You are the project manager of QSL project for your organization. You are working with your project team and several key stakeholders to create a diagram that shows how various elements of a system interrelate and the mechanism of causation within the system. What diagramming technique are you using as a part of the risk identification process?

Options:

A.

Cause and effect diagrams

B.

Influence diagrams

C.

Predecessor and successor diagramming

D.

System or process flowcharts

Question 36

In which of the following DIACAP phases is residual risk analyzed?

Options:

A.

Phase 1

B.

Phase 5

C.

Phase 2

D.

Phase 4

E.

Phase 3

Question 37

Which of the following ISO standards is entitled as "Information technology - Security techniques - Information security management - Measurement"?

Options:

A.

ISO 27003

B.

ISO 27005

C.

ISO 27004

D.

ISO 27006

Question 38

Certification and Accreditation (C&A or CnA) is a process for implementing information security. Which of the following is the correct order of C&A phases in a DITSCAP assessment?

Options:

A.

Verification, Definition, Validation, and Post Accreditation

B.

Definition, Validation, Verification, and Post Accreditation

C.

Definition, Verification, Validation, and Post Accreditation

D.

Verification, Validation, Definition, and Post Accreditation

Question 39

Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee's computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?

Options:

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Authenticity

Question 40

Rob is the project manager of the IDLK Project for his company. This project has a budget of $5,600,000 and is expected to last 18 months. Rob has learned that a new law may affect how the project is allowed to proceed - even though the organization has already invested over $750,000 in the project. What risk response is the most appropriate for this instance?

Options:

A.

Transference

B.

Enhance

C.

Mitigation

D.

Acceptance

Question 41

Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?

Options:

A.

Continuity Of Operations Plan

B.

Business Continuity Plan

C.

Contingency Plan

D.

Disaster Recovery Plan

Question 42

An assistant from the HR Department calls you to ask the Service Hours & Maintenance Slots for your ERP system. In which document will you most probably find this information?

Options:

A.

Service Level Agreement

B.

Release Policy

C.

Service Level Requirements

D.

Underpinning Contract

Question 43

In which of the following SDLC phases is the system's security features configured and enabled, the system is tested and installed or fielded, and the system is authorized for processing?

Options:

A.

Development/Acquisition Phase

B.

Operation/Maintenance Phase

C.

Implementation Phase

D.

Initiation Phase

Question 44

Which of the following allows multiple operating systems (guests) to run concurrently on a host computer?

Options:

A.

Emulator

B.

Hypervisor

C.

Grid computing

D.

CP/CMS

Question 45

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

Options:

A.

Copyright

B.

Utility model

C.

Trade secret

D.

Cookie

Question 46

Information Security management is a process of defining the security controls in order to protect information assets. The first action of a management program to implement information security is to have a security program in place. What are the objectives of a security program? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security education

B.

Security organization

C.

System classification

D.

Information classification

Question 47

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. What are the different types of NIACAP accreditation? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Site accreditation

B.

Type accreditation

C.

Secure accreditation

D.

System accreditation

Question 48

Which of the following is an attack with IP fragments that cannot be reassembled?

Options:

A.

Password guessing attack

B.

Teardrop attack

C.

Dictionary attack

D.

Smurf attack

Question 49

In which of the following deployment models of cloud is the cloud infrastructure administered by the organizations or a third party? Each correct answer represents a complete solution. Choose two.

Options:

A.

Private cloud

B.

Public cloud

C.

Hybrid cloud

D.

Community cloud

Question 50

The Chief Information Officer (CIO), or Information Technology (IT) director, is a job title commonly given to the most senior executive in an enterprise. What are the responsibilities of a Chief Information Officer? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Facilitating the sharing of security risk-related information among authorizing officials

B.

Preserving high-level communications and working group relationships in an organization

C.

Establishing effective continuous monitoring program for the organization

D.

Proposing the information technology needed by an enterprise to achieve its goals and then working within a budget to implement the plan

Question 51

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

Options:

A.

Confidentiality

B.

Non-repudiation

C.

Authentication

D.

Integrity

Question 52

In which of the following testing methods is the test engineer equipped with the knowledge of system and designs test cases or test data based on system knowledge?

Options:

A.

Integration testing

B.

Regression testing

C.

Whitebox testing

D.

Graybox testing

Page: 1 / 0
Total 0 questions