Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

CSSLP ISC Certified Secure Software Lifecycle Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC CSSLP Certified Secure Software Lifecycle Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 5 / 6
Total 349 questions

Which of the following statements about the authentication concept of information security management is true?

A.

It establishes the users' identity and ensures that the users are who they say they are.

B.

It ensures the reliable and timely access to resources.

C.

It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.

D.

It ensures that modifications are not made to data by unauthorized personnel or processes.

Which of the following authentication methods is used to access public areas of a Web site?

A.

Anonymous authentication

B.

Biometrics authentication

C.

Mutual authentication

D.

Multi-factor authentication

Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the international information security standards? Each correct answer represents a complete solution. Choose all that apply.

A.

AU audit and accountability

B.

Human resources security

C.

Organization of information security

D.

Risk assessment and treatment

The DoD 8500 policy series represents the Department's information assurance strategy. Which of the following objectives are defined by the DoD 8500 series? Each correct answer represents a complete solution. Choose all that apply.

A.

Defending systems

B.

Providing IA Certification and Accreditation

C.

Providing command and control and situational awareness

D.

Protecting information

Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?

A.

DDoS attack

B.

Evasion attack

C.

Insertion attack

D.

Dictionary attack

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

A.

Sensitive

B.

Private

C.

Unclassified

D.

Confidential

E.

Secret

F.

Public

What are the security advantages of virtualization, as described in the NIST Information Security and Privacy Advisory Board (ISPAB) paper "Perspectives on Cloud Computing and Standards"? Each correct answer represents a complete solution. Choose three.

A.

It increases capabilities for fault tolerant computing.

B.

It adds a layer of security for defense-in-depth.

C.

It decreases exposure of weak software.

D.

It decreases configuration effort.

Which of the following are the principle duties performed by the BIOS during POST (power-on-self-test)? Each correct answer represents a part of the solution. Choose all that apply.

A.

It provides a user interface for system's configuration.

B.

It identifies, organizes, and selects boot devices.

C.

It delegates control to other BIOS, if it is required.

D.

It discovers size and verifies system memory.

E.

It verifies the integrity of the BIOS code itself.

F.

It interrupts the execution of all running programs.

Which of the following techniques is used to identify attacks originating from a botnet?

A.

Passive OS fingerprinting

B.

Recipient filtering

C.

IFilter

D.

BPF-based filter

You are the project manager of QSL project for your organization. You are working with your project team and several key stakeholders to create a diagram that shows how various elements of a system interrelate and the mechanism of causation within the system. What diagramming technique are you using as a part of the risk identification process?

A.

Cause and effect diagrams

B.

Influence diagrams

C.

Predecessor and successor diagramming

D.

System or process flowcharts

You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?

A.

Availability

B.

Confidentiality

C.

Non repudiation

D.

Data Protection

Which of the following requires all general support systems and major applications to be fully certified and accredited before these systems and applications are put into production? Each correct answer represents a part of the solution. Choose all that apply.

A.

NIST

B.

Office of Management and Budget (OMB)

C.

FIPS

D.

FISMA

Which of the following security models dictates that subjects can only access objects through applications?

A.

Biba model

B.

Bell-LaPadula

C.

Clark-Wilson

D.

Biba-Clark model

In which of the following architecture styles does a device receive input from connectors and generate transformed outputs?

A.

N-tiered

B.

Heterogeneous

C.

Pipes and filters

D.

Layered

Which of the following activities are performed by the 'Do' cycle component of PDCA (plan-do-check-act)? Each correct answer represents a complete solution. Choose all that apply.

A.

It detects and responds to incidents properly.

B.

It determines controls and their objectives.

C.

It manages resources that are required to achieve a goal.

D.

It performs security awareness training.

E.

It operates the selected controls.

In which of the following deployment models of cloud is the cloud infrastructure operated exclusively for an organization?

A.

Public cloud

B.

Community cloud

C.

Private cloud

D.

Hybrid cloud

Which of the following are the primary functions of configuration management?

Each correct answer represents a complete solution. Choose all that apply.

A.

It removes the risk event entirely by adding additional steps to avoid the event.

B.

It ensures that the change is implemented in a sequential manner through formalized testing.

C.

It reduces the negative impact that the change might have had on the computing services and resources.

D.

It analyzes the effect of the change that is implemented on the system.

Continuous Monitoring is the fourth phase of the security certification and accreditation process. What activities are performed in the Continuous Monitoring process? Each correct answer represents a complete solution. Choose all that apply.

A.

Security accreditation decision

B.

Security control monitoring and impact analyses of changes to the information system

C.

Security accreditation documentation

D.

Configuration management and control

E.

Status reporting and documentation

The Data and Analysis Center for Software (DACS) specifies three general principles for software assurance which work as a framework in order to categorize various secure design principles. Which of the following principles and practices does the General Principle 1 include? Each correct answer represents a complete solution. Choose two.

A.

Principle of separation of privileges, duties, and roles

B.

Assume environment data is not trustworthy

C.

Simplify the design

D.

Principle of least privilege

NIST SP 800-53A defines three types of interview depending on the level of assessment conducted. Which of the following NIST SP 800-53A interviews consists of informal and ad hoc interviews?

A.

Comprehensive

B.

Significant

C.

Abbreviated

D.

Substantial

Page: 5 / 6
Total 349 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved