ISC2 CSSLP Questions & Answers

Full Version: 357 Q&A

CSSLP Dumps CSSLP Braindumps
CSSLP Real Questions CSSLP Practice Test CSSLP Actual Questions
killexams.com ISC2 CSSLP
Certified Secure Software Lifecycle Professional
https://killexams.com/pass4sure/exam-detail/CSSLP
Answer option D is incorrect. Mutual authentication is a process in which a client process and server are required to prove their identities to each other before performing any application function. The client and server identities can be verified through a trusted third party and use shared secrets as in the case of Kerberos v5. The MS- CHAP v2 and EAP-TLS authentication methods support mutual authentication.
Answer option B is incorrect. Biometrics authentication uses physical characteristics,
such as fingerprints, scars, retinal patterns, and other forms of biophysical qualities to identify a user.
QUESTION: 298
Which of the following roles is also known as the accreditor?
1. Data owner
2. Chief Risk Officer
3. Chief Information Officer
4. Designated Approving Authority
Answer: D
Explanation:
Designated Approving Authority (DAA) is also known as the accreditor.
Answer option A is incorrect. The data owner (information owner) is usually a member
of management, in charge of a specific business unit, and is ultimately responsible for the protection and use of a specific subset of information. Answer option B is incorrect. A Chief Risk Officer (CRO) is also known as Chief Risk Management Officer (CRMO). The Chief Risk Officer or Chief Risk Management Officer of a corporation is the executive accountable for enabling the efficient and effective governance of significant risks, and related opportunities, to a business and its various segments. Risks are commonly categorized as strategic, reputational, operational, financial, or compliance- related. CRO's are accountable to the Executive Committee and The Board for enabling the business to balance risk and reward. In more complex organizations, they are generally responsible for coordinating the organization's Enterprise Risk Management (ERM) approach.
Answer option C is incorrect. The Chief Information Officer (CIO), or Information
Technology (IT) director, is a job title commonly given to the most senior executive in an enterprise responsible for the information technology and computer systems that support enterprise goals. The CIO plays the role of a leader and reports to the chief executive officer, chief operations officer, or chief financial officer. In military organizations, they report to the commanding officer.
QUESTION: 299
The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to obtain a fully integrated system for certification testing and accreditation. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.
1. Registration
2. System development
3. Certification analysis
4. Assessment of the Analysis Results
5. Configuring refinement of the SSAA
Answer: B,C,D,E
Explanation:
The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to
obtain a fully integrated system for certification testing and accreditation. This phase takes place between the signing of the initial version of the SSAA and the formal accreditation of the system. This phase verifies security requirements during system development. The process activities of this phase are as follows:
Configuring refinement of the SSAA System development Certification analysis
Assessment of the Analysis Results
Answer option A is incorrect. Registration is a Phase 1 activity.
QUESTION: 300
Which of the following methods determines the principle name of the current user and
returns the java.security.Principal object in the HttpServletRequest interface?
1. getCallerPrincipal()
2. getRemoteUser()
3. isUserInRole()
4. getUserPrincipal()
Answer: D
Explanation:
The getUserPrincipal() method determines the principle name of the current user and returns the java.security.Principal object. The java.security.Principal object contains the
remote user name. The value of the getUserPrincipal() method returns null if no user is authenticated.
Answer option B is incorrect. The getRemoteUser() method returns the user name that is used for the client authentication. The value of the getRemoteUser() method returns null if no user is authenticated.
Answer option C is incorrect. The isUserInRole() method determines whether the
remote user is granted a specified user role. The value of the isUserInRole() method returns true if the remote user is granted the specified user role; otherwise it returns false.
Answer option A is incorrect. The getCallerPrincipal() method is used to identify a
caller using a java.security.Principal object. It is not used in the HttpServletRequest interface.
QUESTION: 301
Which of the following strategies is used to minimize the effects of a disruptive event
on a company, and is created to prevent interruptions to normal business activity?
1. Continuity of Operations Plan
2. Disaster Recovery Plan
3. Contingency Plan
4. Business Continuity Plan
Answer: D
Explanation:
BCP is a strategy to minimize the consequence of the instability and to allow for the
continuation of business processes. The goal of BCP is to minimize the effects of a disruptive event on a company, and is formed to avoid interruptions to normal business activity.
Business Continuity Planning (BCP) is the creation and validation of a practiced
logistical plan for how an organization will recover and restore partially or completely interrupted critical (urgent) functions within a predetermined time after a disaster or extended disruption. The logistical plan is called a business continuity plan.
Answer option C is incorrect. A contingency plan is a plan devised for a specific
situation when things could go wrong. Contingency plans are often devised by governments or businesses who want to be prepared for anything that could happen. Contingency plans include specific strategies and actions to deal with specific variances to assumptions resulting in a particular problem, emergency, or state of affairs. They also include a monitoring process and "triggers" for initiating planned actions. They are required to help governments, businesses, or individuals to recover from serious incidents in the minimum time with minimum cost and disruption.
Answer option B is incorrect. Disaster recovery planning is a subset of a larger process
known as business continuity planning and should include planning for resumption of applications, data, hardware, communications (such as networking), and other IT infrastructure. A business continuity plan (BCP) includes planning for non-IT related
aspects such as key personnel, facilities, crisis communication, and reputation protection, and should refer to the disaster recovery plan (DRP) for IT-related infrastructure recovery/continuity.
Answer option A is incorrect. The Continuity Of Operation Plan (COOP) refers to the
preparations and institutions maintained by the United States government, providing survival of federal government operations in the case of catastrophic events. It provides procedures and capabilities to sustain an organization's essential. COOP is the procedure documented to ensure persistent critical operations throughout any period where normal operations are unattainable.
QUESTION: 302
Single Loss Expectancy (SLE) represents an organization's loss from a single threat. Which of the following formulas best describes the Single Loss Expectancy (SLE)?
1. SLE = Asset Value (AV) * Exposure Factor (EF)
2. SLE = Annualized Loss Expectancy (ALE) * Exposure Factor (EF)
3. SLE = Annualized Loss Expectancy (ALE) * Annualized Rate of Occurrence (ARO)
4. SLE = Asset Value (AV) * Annualized Rate of Occurrence (ARO)
Answer: A
Explanation:
Single Loss Expectancy is a term related to Risk Management and Risk Assessment. It can be defined as the monetary value expected from the occurrence of a risk on an asset.
It is mathematically expressed as follows:
Single Loss Expectancy (SLE) = Asset Value (AV) * Exposure Factor (EF)
where the Exposure Factor is represented in the impact of the risk over the asset, or percentage of asset lost. As an example, if the Asset Value is reduced two thirds, the exposure factor value is .66. If the asset is completely lost, the Exposure Factor is 1.0. The result is a monetary value in the same unit as the Single Loss Expectancy is expressed. Answer options B, D, and C are incorrect. These are not valid formulas of SLE.
QUESTION: 303
John works as a professional Ethical Hacker. He has been assigned the project of testing
the security of www.we-are-secure.com. In order to do so, he performs the following steps of the pre-attack phase successfully:
Information gathering Determination of network range Identification of active systems Location of open ports and applications Now, which of the following tasks should he
perform next?
1. Install a backdoor to log in remotely on the We-are-secure server.
2. Fingerprint the services running on the we-are-secure network.
3. Map the network of We-are-secure Inc.
4. Perform OS fingerprinting on the We-are-secure network.
Answer: D
Explanation:
John will perform OS fingerprinting on the We-are-secure network. Fingerprinting is the
easiest way to detect the Operating System (OS) of a remote system. OS detection is important because, after knowing the target system's OS, it becomes easier to hack into the system. The comparison of data packets that are sent by the target system is done by fingerprinting. The analysis of data packets gives the attacker a hint as to which operating system is being used by the remote system. There are two types of fingerprinting techniques as follows:
1. Active fingerprinting
2. Passive fingerprinting In active fingerprinting ICMP messages are sent to the target
system and the response message of the target system shows which OS is being used by the remote system. In passive fingerprinting the number of hops reveals the OS of the remote system.
Answer options B and C are incorrect. John should perform OS fingerprinting first, after
which it will be easy to identify which services are running on the network since there are many services that run only on a specific operating system. After performing OS fingerprinting, John should perform networking mapping.
Answer option A is incorrect. This is a pre-attack phase, and only after gathering all
relevant knowledge of a network should John install a backdoor.
QUESTION: 304
Fill in the blank with an appropriate phrase.A is defined as any
activity that has an effect on defining, designing, building, or executing a task, requirement, or procedure.
Answer:
A technical effo
Explanation:
A technical effort is described as any activity, which has an effect on defining,
designing, building, or implementing a task, requirement, or procedure. The technical effort is an element of technical management that is required to progress efficiently and effectively from a business need to the deployment and operation of the system.

User: Yuriy*****

csslp was the hardest exam I had ever come across. I spent months analyzing it with expert sources, but still failed miserably. However, I did not give up! A few months later, I added Killexams.com to my study plan and paid close attention to the sorting out engine and the actual exam questions they provide. I believe this is what helped me pass the second time around. I wish I had not wasted my time and money on unnecessary materials (though their books are not terrible). I think Killexams.com provides the best exam training.
User: Alma*****

The killexams.com csslp material provided notable help for me while preparing for the exam. The material was clear and easy to understand, which helped me achieve an excellent result.
User: Amanda*****

Passing my csslp exam was crucial for keeping my job at my current company, but I knew it would not be easy without some assistance. Fortunately, I was able to learn a lot from Killexams.com training pack, which included csslp questions and answers as well as an exam simulator. Now, I am proud to announce that I am csslp certified. Thank you, Killexams.com, for helping me achieve my goal.
User: Tina*****

I found killexams.com to be the most satisfactory website when it came to addressing and correcting all my errors in the certified secure software lifecycle professional topic. The website allowed me to perform better in the exam compared to others. I was satisfied to have valid certified secure software lifecycle professional Questions and Answers to study from, and it is an excellent practice test website for the certified secure software lifecycle professional exam.
User: Jacob*****

killexams.com has been a godsend to me, and I am now able to pursue higher-level jobs and select better organizations thanks to their exam materials. Though the CSSLP exam and certification is specific to CSSLP, other employers will be interested in your certification, proving you to be a qualified candidate. The killexams.com CSSLP exam guide covered all topics and areas, which made the exam less challenging. Though some questions were tricky, killexams.com helped me get most of them right.

Features of iPass4sure CSSLP Exam

  • Files: PDF / Test Engine
  • Premium Access
  • Online Test Engine
  • Instant download Access
  • Comprehensive Q&A
  • Success Rate
  • Real Questions
  • Updated Regularly
  • Portable Files
  • Unlimited Download
  • 100% Secured
  • Confidentiality: 100%
  • Success Guarantee: 100%
  • Any Hidden Cost: $0.00
  • Auto Recharge: No
  • Updates Intimation: by Email
  • Technical Support: Free
  • PDF Compatibility: Windows, Android, iOS, Linux
  • Test Engine Compatibility: Mac / Windows / Android / iOS / Linux

Premium PDF with 357 Q&A

Get Full Version

All ISC2 Exams

ISC2 Exams

Certification and Entry Test Exams

Complete exam list