Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

CSSLP Sample Questions Answers

Questions 4

You work as a security engineer for BlueWell Inc. You want to use some techniques and procedures to verify the effectiveness of security controls in Federal Information System. Which of the following NIST documents will guide you?

Options:

A.

NIST Special Publication 800-53

B.

NIST Special Publication 800-59

C.

NIST Special Publication 800-53A

D.

NIST Special Publication 800-37

Buy Now
Questions 5

Fill in the blank with an appropriate security type. applies the internal security policies of the software applications when they are deployed.

Options:

A.

Programmatic security

Buy Now
Questions 6

Which of the following is a patch management utility that scans one or more computers on a network and alerts a user if any important Microsoft security patches are missing and also provides links that enable those missing patches to be downloaded and installed?

Options:

A.

MABS

B.

ASNB

C.

MBSA

D.

IDMS

Buy Now
Questions 7

In digital rights management, the level of robustness depends on the various types of tools and attacks to which they must be resistant or immune. Which of the following types of tools are expensive, require skill, and are not easily available?

Options:

A.

Hand tools

B.

Widely available tools

C.

Specialized tools

D.

Professional tools

Buy Now
Questions 8

Which of the following terms refers to the protection of data against unauthorized access?

Options:

A.

Integrity

B.

Recovery

C.

Auditing

D.

Confidentiality

Buy Now
Questions 9

Which of the following can be used to accomplish authentication? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Encryption

B.

Biometrics

C.

Token

D.

Password

Buy Now
Questions 10

FIPS 199 defines the three levels of potential impact on organizations: low, moderate, and high. Which of the following are the effects of loss of confidentiality, integrity, or availability in a high level potential impact?

Options:

A.

The loss of confidentiality, integrity, or availability might result in a major damage to organizational assets.

B.

The loss of confidentiality, integrity, or availability might result in severe damages like life threatening injuries or loss of life.

C.

The loss of confidentiality, integrity, or availability might result in major financial losses.

D.

The loss of confidentiality, integrity, or availability might cause severe degradation in or loss of mission capability to an extent.

Buy Now
Questions 11

Which of the following processes identifies the threats that can impact the business continuity of operations?

Options:

A.

Function analysis

B.

Risk analysis

C.

Business impact analysis

D.

Requirement analysis

Buy Now
Questions 12

Which of the following security architectures defines how to integrate widely disparate applications for a world that is Web-based and uses multiple implementation platforms?

Options:

A.

Sherwood Applied Business Security Architecture

B.

Enterprise architecture

C.

Service-oriented architecture

D.

Service-oriented modeling and architecture

Buy Now
Questions 13

Which of the following allows multiple operating systems (guests) to run concurrently on a host computer?

Options:

A.

Emulator

B.

Hypervisor

C.

Grid computing

D.

CP/CMS

Buy Now
Questions 14

The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to obtain a fully integrated system for certification testing and accreditation. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Certification analysis

B.

Assessment of the Analysis Results

C.

Configuring refinement of the SSAA

D.

System development

E.

Registration

Buy Now
Questions 15

Which of the following DoD policies establishes policies and assigns responsibilities to achieve DoD IA through a defense-in-depth approach that integrates the capabilities of personnel, operations, and technology, and supports the evolution to network-centric warfare?

Options:

A.

DoDI 5200.40

B.

DoD 8500.1 Information Assurance (IA)

C.

DoD 8510.1-M DITSCAP

D.

DoD 8500.2 Information Assurance Implementation

Buy Now
Questions 16

Which of the following are the benefits of information classification for an organization? Each correct answer represents a complete solution. Choose two.

Options:

A.

It helps reduce the Total Cost of Ownership (TCO).

B.

It helps identify which protections apply to which information.

C.

It helps identify which information is the most sensitive or vital to an organization.

D.

It ensures that modifications are not made to data by unauthorized personnel or processes.

Buy Now
Questions 17

Which of the following elements of the BCP process emphasizes on creating the scope and the additional elements required to define the parameters of the plan?

Options:

A.

Business continuity plan development

B.

Plan approval and implementation

C.

Business impact analysis

D.

Scope and plan initiation

Buy Now
Questions 18

Security is a state of well-being of information and infrastructures in which the possibilities of successful yet undetected theft, tampering, and/or disruption of information and services are kept low or tolerable. Which of the following are the elements of security? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Integrity

B.

Authenticity

C.

Confidentiality

D.

Availability

Buy Now
Questions 19

Fill in the blank with an appropriate phrase. is used to provide security mechanisms for the storage, processing, and transfer of data.

Options:

A.

Data classification

Buy Now
Questions 20

The Data and Analysis Center for Software (DACS) specifies three general principles for software assurance which work as a framework in order to categorize various secure design principles. Which of the following principles and practices does the General Principle 1 include? Each correct answer represents a complete solution. Choose two.

Options:

A.

Principle of separation of privileges, duties, and roles

B.

Assume environment data is not trustworthy

C.

Simplify the design

D.

Principle of least privilege

Buy Now
Questions 21

Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Kernel flaws

B.

Information system architectures

C.

Race conditions

D.

File and directory permissions

E.

Buffer overflows

F.

Trojan horses

G.

Social engineering

Buy Now
Questions 22

Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?

Options:

A.

DDoS attack

B.

Evasion attack

C.

Insertion attack

D.

Dictionary attack

Buy Now
Questions 23

Which of the following types of obfuscation transformation increases the difficulty for a de-obfuscation tool so that it cannot extract the true application from the obfuscated version?

Options:

A.

Preventive transformation

B.

Data obfuscation

C.

Control obfuscation

D.

Layout obfuscation

Buy Now
Questions 24

What project management plan is most likely to direct the quantitative risk analysis process for a project in a matrix environment?

Options:

A.

Risk analysis plan

B.

Staffing management plan

C.

Risk management plan

D.

Human resource management plan

Buy Now
Questions 25

Which of the following tiers addresses risks from an information system perspective?

Options:

A.

Tier 0

B.

Tier 3

C.

Tier 2

D.

Tier 1

Buy Now
Questions 26

You are the project manager of QSL project for your organization. You are working with your project team and several key stakeholders to create a diagram that shows how various elements of a system interrelate and the mechanism of causation within the system. What diagramming technique are you using as a part of the risk identification process?

Options:

A.

Cause and effect diagrams

B.

Influence diagrams

C.

Predecessor and successor diagramming

D.

System or process flowcharts

Buy Now
Questions 27

Which of the following phases of the DITSCAP C&A process is used to define the C&A level of effort, to identify the main C&A roles and responsibilities, and to create an agreement on the method for implementing the security requirements?

Options:

A.

Phase 1

B.

Phase 4

C.

Phase 2

D.

Phase 3

Buy Now
Questions 28

What are the various phases of the Software Assurance Acquisition process according to the U.S. Department of Defense (DoD) and Department of Homeland Security (DHS) Acquisition and Outsourcing Working Group?

Options:

A.

Implementing, contracting, auditing, monitoring

B.

Requirements, planning, monitoring, auditing

C.

Planning, contracting, monitoring and acceptance, follow-on

D.

Designing, implementing, contracting, monitoring

Buy Now
Questions 29

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Options:

A.

Single Loss Expectancy (SLE)

B.

Annualized Rate of Occurrence (ARO)

C.

Safeguard

D.

Exposure Factor (EF)

Buy Now
Questions 30

Which of the following is a malicious exploit of a website, whereby unauthorized commands are transmitted from a user trusted by the website?

Options:

A.

Cross-Site Scripting

B.

Injection flaw

C.

Side channel attack

D.

Cross-Site Request Forgery

Buy Now
Questions 31

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

Options:

A.

Cold site

B.

Off site

C.

Warm site

D.

Hot site

Buy Now
Questions 32

You are the project manager for your organization. You are preparing for the quantitative risk analysis. Mark, a project team member, wants to know why you need to do quantitative risk analysis when you just completed qualitative risk analysis. Which one of the following statements best defines what quantitative risk analysis is?

Options:

A.

Quantitative risk analysis is the process of prioritizing risks for further analysis or action by assessing and combining their probability of occurrence and impact.

B.

Quantitative risk analysis is the review of the risk events with the high probability and the highest impact on the project objectives.

C.

Quantitative risk analysis is the planning and quantification of risk responses based on probability and impact of each risk event.

D.

Quantitative risk analysis is the process of numerically analyzing the effect of identified risks on overall project objectives.

Buy Now
Questions 33

In which of the following deployment models of cloud is the cloud infrastructure operated exclusively for an organization?

Options:

A.

Public cloud

B.

Community cloud

C.

Private cloud

D.

Hybrid cloud

Buy Now
Questions 34

The Project Risk Management knowledge area focuses on which of the following processes? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk Monitoring and Control

B.

Risk Management Planning

C.

Quantitative Risk Analysis

D.

Potential Risk Monitoring

Buy Now
Questions 35

Which of the following sections come under the ISO/IEC 27002 standard?

Options:

A.

Security policy

B.

Asset management

C.

Financial assessment

D.

Risk assessment

Buy Now
Questions 36

Which of the following activities are performed by the 'Do' cycle component of PDCA (plan-do-check-act)? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It detects and responds to incidents properly.

B.

It determines controls and their objectives.

C.

It manages resources that are required to achieve a goal.

D.

It performs security awareness training.

E.

It operates the selected controls.

Buy Now
Questions 37

Which of the following types of redundancy prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data?

Options:

A.

Data redundancy

B.

Hardware redundancy

C.

Process redundancy

D.

Application redundancy

Buy Now
Questions 38

Which of the following is an example of over-the-air (OTA) provisioning in digital rights management?

Options:

A.

Use of shared secrets to initiate or rebuild trust.

B.

Use of software to meet the deployment goals.

C.

Use of concealment to avoid tampering attacks.

D.

Use of device properties for unique identification.

Buy Now
Questions 39

The Phase 1 of DITSCAP C&A is known as Definition Phase. The goal of this phase is to define the C&A level of effort, identify the main C&A roles and responsibilities, and create an agreement on the method for implementing the security requirements. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Negotiation

B.

Registration

C.

Document mission need

D.

Initial Certification Analysis

Buy Now
Questions 40

Which of the following methods determines the principle name of the current user and returns the jav a.security.Principal object in the HttpServletRequest interface?

Options:

A.

getUserPrincipal()

B.

isUserInRole()

C.

getRemoteUser()

D.

getCallerPrincipal()

Buy Now
Questions 41

Fill in the blank with an appropriate phrase. models address specifications, requirements, design, verification and validation, and maintenance activities. A. Life cycle

Options:

Buy Now
Questions 42

You have a storage media with some data and you make efforts to remove this data. After performing this, you analyze that the data remains present on the media. Which of the following refers to the above mentioned condition?

Options:

A.

Object reuse

B.

Degaussing

C.

Residual

D.

Data remanence

Buy Now
Questions 43

In which of the following processes are experienced personnel and software tools used to investigate, resolve, and handle process deviation, malformed data, infrastructure, or connectivity issues?

Options:

A.

Risk Management

B.

Exception management

C.

Configuration Management

D.

Change Management

Buy Now
Questions 44

Which of the following is a variant with regard to Configuration Management?

Options:

A.

A CI that has the same name as another CI but shares no relationship.

B.

A CI that particularly refers to a software version.

C.

A CI that has the same essential functionality as another CI but a bit different in some small manner.

D.

A CI that particularly refers to a hardware specification.

Buy Now
Questions 45

You work as a Security Manager for Tech Perfect Inc. In the organization, Syslog is used for computer system management and security auditing, as well as for generalized informational, analysis, and debugging messages. You want to prevent a denial of service (DoS) for the Syslog server and the loss of Syslog messages from other sources. What will you do to accomplish the task?

Options:

A.

Use a different message format other than Syslog in order to accept data.

B.

Enable the storage of log entries in both traditional Syslog files and a database.

C.

Limit the number of Syslog messages or TCP connections from a specific source for a certain time period.

D.

Encrypt rotated log files automatically using third-party or OS mechanisms.

Buy Now
Questions 46

Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive Branch agencies?

Options:

A.

OMB

B.

NIST

C.

NSA/CSS

D.

DCAA

Buy Now
Questions 47

Which of the following DITSCAP C&A phases takes place between the signing of the initial version of the SSAA and the formal accreditation of the system?

Options:

A.

Phase 4

B.

Phase 3

C.

Phase 1

D.

Phase 2

Buy Now
Questions 48

Which of the following types of signatures is used in an Intrusion Detection System to trigger on attacks that attempt to reduce the level of a resource or system, or to cause it to crash?

Options:

A.

Access

B.

Benign

C.

DoS

D.

Reconnaissance

Buy Now
Questions 49

Bill is the project manager of the JKH Project. He and the project team have identified a risk event in the project with a high probability of occurrence and the risk event has a high cost impact on the project. Bill discusses the risk event with Virginia, the primary project customer, and she decides that the requirements surrounding the risk event should be removed from the project. The removal of the requirements does affect the project scope, but it can release the project from the high risk exposure. What risk response has been enacted in this project?

Options:

A.

Mitigation

B.

Transference

C.

Acceptance

D.

Avoidance

Buy Now
Questions 50

Which of the following is a signature-based intrusion detection system (IDS) ?

Options:

A.

RealSecure

B.

StealthWatch

C.

Tripwire

D.

Snort

Buy Now
Questions 51

You are the project manager of the NNN project for your company. You and the project team are working together to plan the risk responses for the project. You feel that the team has successfully completed the risk response planning and now you must initiate what risk process it is. Which of the following risk processes is repeated after the plan risk responses to determine if the overall project risk has been satisfactorily decreased?

Options:

A.

Quantitative risk analysis

B.

Risk identification

C.

Risk response implementation

D.

Qualitative risk analysis

Buy Now
Questions 52

Which of the following tools is used to attack the Digital Watermarking?

Options:

A.

Steg-Only Attack

B.

Active Attacks

C.

2Mosaic

D.

Gifshuffle

Buy Now