Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

ISC CSSLP Actual Questions

Page: 8 / 12
Question 32

In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?

Options:

A.

Full operational test

B.

Penetration test

C.

Paper test

D.

Walk-through test

Question 33

Microsoft software security expert Michael Howard defines some heuristics for determining code review in "A Process for Performing Security Code Reviews". Which of the following heuristics increase the application's attack surface? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Code written in C/C++/assembly language

B.

Code listening on a globally accessible network interface

C.

Code that changes frequently

D.

Anonymously accessible code

E.

Code that runs by default

F.

Code that runs in elevated context

Question 34

You work as a Security Manager for Tech Perfect Inc. You have set up a SIEM server for the following purposes: Analyze the data from different log sources Correlate the events among the log entries Identify and prioritize significant events Initiate responses to events if required One of your log monitoring staff wants to know the features of SIEM product that will help them in these purposes. What features will you recommend? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Asset information storage and correlation

B.

Transmission confidentiality protection

C.

Incident tracking and reporting

D.

Security knowledge base

E.

Graphical user interface

Question 35

You work as the senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?

Options:

A.

Configuration status accounting

B.

Configuration identification

C.

Configuration auditing

D.

Configuration control

Page: 8 / 12
Exam Code: CSSLP
Exam Name: Certified Secure Software Lifecycle Professional
Last Update: May 4, 2024
Questions: 0
CSSLP pdf

CSSLP PDF

$28  $80
CSSLP Engine

CSSLP Testing Engine

$33.25  $95
CSSLP PDF + Engine

CSSLP PDF + Testing Engine

$297.5  $850