Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CSSLP Exam Dumps - Certified Secure Software Lifecycle Professional

Go to page:
Question # 41

Which of the following plans is a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources?

A.

Contingency plan

B.

Continuity of Operations plan

C.

Disaster recovery plan

D.

Business Continuity plan

Full Access
Question # 42

Fill in the blank with an appropriate security type. applies the internal security policies of the software applications when they are deployed.

A.

Programmatic security

Full Access
Question # 43

What NIACAP certification levels are recommended by the certifier? Each correct answer represents a complete solution. Choose all that apply.

A.

Comprehensive Analysis

B.

Maximum Analysis

C.

Detailed Analysis

D.

Minimum Analysis

E.

Basic Security Review

F.

Basic System Review

Full Access
Question # 44

The service-oriented modeling framework (SOMF) introduces five major life cycle modeling activities that drive a service evolution during design-time and run-time. Which of the following activities integrates SOA software assets and establishes SOA logical environment dependencies?

A.

Service-oriented discovery and analysis modeling

B.

Service-oriented business integration modeling

C.

Service-oriented logical architecture modeling

D.

Service-oriented logical design modeling

Full Access
Question # 45

The rights of an author or a corporation to make profit from the creation of their products (such as software, music, etc.) are protected by the Intellectual Property law. Which of the following are the components of the Intellectual Property law? Each correct answer represents a part of the solution. Choose two.

A.

Trademark law

B.

Industrial Property law

C.

Copyright law

D.

Patent law

Full Access
Question # 46

Which of the following are the important areas addressed by a software system's security policy? Each correct answer represents a complete solution. Choose all that apply.

A.

Identification and authentication

B.

Punctuality

C.

Data protection

D.

Accountability

E.

Scalability

F.

Access control

Full Access
Question # 47

FIPS 199 defines the three levels of potential impact on organizations: low, moderate, and high. Which of the following are the effects of loss of confidentiality, integrity, or availability in a high level potential impact?

A.

The loss of confidentiality, integrity, or availability might result in a major damage to organizational assets.

B.

The loss of confidentiality, integrity, or availability might result in severe damages like life threatening injuries or loss of life.

C.

The loss of confidentiality, integrity, or availability might result in major financial losses.

D.

The loss of confidentiality, integrity, or availability might cause severe degradation in or loss of mission capability to an extent.

Full Access
Question # 48

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

A.

Evasion attack

B.

Fragmentation overlap attack

C.

Fragmentation overwrite attack

D.

Insertion attack

Full Access
Go to page: