Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CSSLP Exam Dumps - Certified Secure Software Lifecycle Professional

Go to page:
Question # 9

A number of security patterns for Web applications under the DARPA contract have been developed by Kienzle, Elder, Tyree, and Edwards-Hewitt. Which of the following patterns are applicable to aspects of authentication in Web applications?b Each correct answer represents a complete solution. Choose all that apply.

A.

Authenticated session

B.

Secure assertion

C.

Partitioned application

D.

Password authentication

E.

Account lockout

F.

Password propagation

Full Access
Question # 10

Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

A.

Valuations of the critical assets in hard costs.

B.

Evaluate potential threats to the assets.

C.

Estimate the potential losses to assets by determining their value.

D.

Establish the threats likelihood and regularity.

Full Access
Question # 11

Which of the following provides an easy way to programmers for writing lower-risk applications and retrofitting security into an existing application?

A.

Watermarking

B.

ESAPI

C.

Encryption wrapper

D.

Code obfuscation

Full Access
Question # 12

Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the international information security standards? Each correct answer represents a complete solution. Choose all that apply.

A.

AU audit and accountability

B.

Human resources security

C.

Organization of information security

D.

Risk assessment and treatment

Full Access
Question # 13

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

A.

Sensitive

B.

Private

C.

Unclassified

D.

Confidential

E.

Secret

F.

Public

Full Access
Question # 14

Which of the following governance bodies directs and coordinates implementations of the information security program?

A.

Chief Information Security Officer

B.

Information Security Steering Committee

C.

Business Unit Manager

D.

Senior Management

Full Access
Question # 15

Which of the following areas of information system, as separated by Information Assurance Framework, is a collection of local computing devices, regardless of physical location, that are interconnected via local area networks (LANs) and governed by a single security policy?

A.

Local Computing Environments

B.

Networks and Infrastructures

C.

Supporting Infrastructures

D.

Enclave Boundaries

Full Access
Question # 16

ISO 27003 is an information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Which of the following elements does this standard contain? Each correct answer represents a complete solution. Choose all that apply.

A.

Inter-Organization Co-operation

B.

Information Security Risk Treatment

C.

CSFs (Critical success factors)

D.

ystem requirements for certification bodies Managements

E.

Terms and Definitions

F.

Guidance on process approach

Full Access
Go to page: