Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CSSLP Exam Dumps - Certified Secure Software Lifecycle Professional

Go to page:
Question # 33

Which of the following SDLC phases consists of the given security controls: Misuse Case Modeling Security Design and Architecture Review Threat and Risk Modeling Security Requirements and Test Cases Generation?

A.

Deployment

B.

Requirements Gathering

C.

Maintenance

D.

Design

Full Access
Question # 34

Which of the following is an open source network intrusion detection system?

A.

NETSH

B.

Macof

C.

Sourcefire

D.

Snort

Full Access
Question # 35

Fill in the blank with the appropriate security mechanism. is a computer hardware mechanism or programming language construct which handles the occurrence of exceptional events.

A.

Exception handling

Full Access
Question # 36

Which of the following is a malicious exploit of a website, whereby unauthorized commands are transmitted from a user trusted by the website?

A.

Cross-Site Scripting

B.

Injection flaw

C.

Side channel attack

D.

Cross-Site Request Forgery

Full Access
Question # 37

Which of the following specifies access privileges to a collection of resources by using the URL mapping?

A.

Code Access Security

B.

Security constraint

C.

Configuration Management

D.

Access Management

Full Access
Question # 38

Which of the following authentication methods is used to access public areas of a Web site?

A.

Anonymous authentication

B.

Biometrics authentication

C.

Mutual authentication

D.

Multi-factor authentication

Full Access
Question # 39

The LeGrand Vulnerability-Oriented Risk Management method is based on vulnerability analysis and consists of four principle steps. Which of the following processes does the risk assessment step include? Each correct answer represents a part of the solution. Choose all that apply.

A.

Remediation of a particular vulnerability

B.

Cost-benefit examination of countermeasures

C.

Identification of vulnerabilities

D.

Assessment of attacks

Full Access
Question # 40

Which of the following DoD directives defines DITSCAP as the standard C&A process for the Department of Defense?

A.

DoD 8910.1

B.

DoD 5200.22-M

C.

DoD 8000.1

D.

DoD 5200.40

Full Access
Go to page: