Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CSSLP Exam Dumps - Certified Secure Software Lifecycle Professional

Go to page:
Question # 25

Which of the following access control models are used in the commercial sector? Each correct answer represents a complete solution. Choose two.

A.

Biba model

B.

Clark-Biba model

C.

Clark-Wilson model

D.

Bell-LaPadula model

Full Access
Question # 26

The IAM/CA makes certification accreditation recommendations to the DAA. The DAA issues accreditation determinations. Which of the following are the accreditation determinations issued by the DAA? Each correct answer represents a complete solution. Choose all that apply.

A.

IATT

B.

IATO

C.

DATO

D.

ATO

E.

ATT

Full Access
Question # 27

To help review or design security controls, they can be classified by several criteria . One of these criteria is based on their nature. According to this criterion, which of the following controls consists of incident response processes, management oversight, security awareness, and training?

A.

Compliance control

B.

Physical control

C.

Procedural control

D.

Technical control

Full Access
Question # 28

Which of the following is a name, symbol, or slogan with which a product is identified?

A.

Trademark

B.

Copyright

C.

Trade secret

D.

Patent

Full Access
Question # 29

You work as a Security Manager for Tech Perfect Inc. You find that some applications have failed to encrypt network traffic while ensuring secure communications in the organization. Which of the following will you use to resolve the issue?

A.

SCP

B.

TLS

C.

IPSec

D.

HTTPS

Full Access
Question # 30

Which of the following characteristics are described by the DIAP Information Readiness Assessment function? Each correct answer represents a complete solution. Choose all that apply.

A.

It provides for entry and storage of individual system data.

B.

It performs vulnerability/threat analysis assessment.

C.

It provides data needed to accurately assess IA readiness.

D.

It identifies and generates IA requirements.

Full Access
Question # 31

Security controls are safeguards or countermeasures to avoid, counteract, or minimize security risks. Which of the following are types of security controls? Each correct answer represents a complete solution. Choose all that apply.

A.

Common controls

B.

Hybrid controls

C.

Storage controls

D.

System-specific controls

Full Access
Question # 32

Which of the following components of configuration management involves periodic checks to determine the consistency and completeness of accounting information and to verify that all configuration management policies are being followed?

A.

Configuration Identification

B.

Configuration Auditing

C.

Configuration Control

D.

Configuration Status Accounting

Full Access
Go to page: