Pass4itsure > ISC > ISC Certification > CSSLP > CSSLP Online Practice Questions and Answers

CSSLP Online Practice Questions and Answers

Questions 4

Which of the following penetration testing techniques automatically tests every phone line in an exchange and tries to locate modems that are attached to the network?

A. Demon dialing

B. Sniffing

C. Social engineering

D. Dumpster diving

Buy Now
Questions 5

Bill is the project manager of the JKH Project. He and the project team have identified a risk event in the project with a high probability of occurrence and the risk event has a high cost impact on the project. Bill discusses the risk event with Virginia, the primary project customer, and she decides that the requirements surrounding the risk event should be removed from the project. The removal of the requirements does affect the project scope, but it can release the project from the high risk exposure. What risk response has been enacted in this project?

A. Mitigation

B. Transference

C. Acceptance

D. Avoidance

Buy Now
Questions 6

Which of the following phases of DITSCAP includes the activities that are necessary for the continuing operation of an accredited IT system in its computing environment and for addressing the changing threats that a system faces throughout its life cycle?

A. Phase 3, Validation

B. Phase 1, Definition

C. Phase 2, Verification

D. Phase 4, Post Accreditation Phase

Buy Now
Questions 7

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software? Each correct answer represents a complete solution. Choose all that apply.

A. Change and Configuration Control

B. Security Certification and Accreditation (CandA)

C. Vulnerability Assessment and Penetration Testing

D. Risk Adjustments

Buy Now
Questions 8

The rights of an author or a corporation to make profit from the creation of their products (such as software, music, etc.) are protected by the Intellectual Property law. Which of the following are the components of the Intellectual Property law? Each correct answer represents a part of the solution. Choose two.

A. Trademark law

B. Industrial Property law

C. Copyright law

D. Patent law

Buy Now
Questions 9

Which of the following processes describes the elements such as quantity, quality, coverage, timelines, and availability, and categorizes the different functions that the system will need to perform in order to gather the documented mission/ business needs?

A. Human factors

B. Functional requirements

C. Performance requirements

D. Operational scenarios

Buy Now
Questions 10

Elizabeth is a project manager for her organization and she finds risk management to be very difficult for her to manage. She asks you, a lead project manager, at what stage in the project will risk management become easier. What answer best resolves the difficulty of risk management practices and the effort required?

A. Risk management only becomes easier when the project moves into project execution.

B. Risk management only becomes easier when the project is closed.

C. Risk management is an iterative process and never becomes easier.

D. Risk management only becomes easier the more often it is practiced.

Buy Now
Questions 11

Henry is the project manager of the QBG Project for his company. This project has a budget of $4,576,900 and is expected to last 18 months to complete. The CIO, a stakeholder in the project, has introduced a scope change request for additional deliverables as part of the project work. What component of the change control system would review the proposed changes' impact on the features and functions of the project's product?

A. Configuration management system

B. Scope change control system

C. Cost change control system

D. Integrated change control

Buy Now
Questions 12

Which of the following phases of NIST SP 800-37 CandA methodology examines the residual risk for acceptability, and prepares the final security accreditation package?

A. Security Accreditation

B. Initiation

C. Continuous Monitoring

D. Security Certification

Buy Now
Questions 13

Which of the following is NOT a responsibility of a data owner?

A. Approving access requests

B. Ensuring that the necessary security controls are in place

C. Delegating responsibility of the day-to-day maintenance of the data protection mechanisms to the data custodian

D. Maintaining and protecting data

Buy Now
Exam Code: CSSLP
Exam Name: Certified Secure Software Lifecycle Professional Practice Test
Last Update: May 01, 2024
Questions: 354
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99