Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

CSSLP ISC Certified Secure Software Lifecycle Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC CSSLP Certified Secure Software Lifecycle Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 6
Total 349 questions

John works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cost effective DRP testing plan. According to you, which of the following disaster recovery testing plans is the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises?

A.

Full-scale exercise

B.

Walk-through drill

C.

Structured walk-through test

D.

Evacuation drill

In which of the following SDLC phases is the system's security features configured and enabled, the system is tested and installed or fielded, and the system is authorized for processing?

A.

Development/Acquisition Phase

B.

Operation/Maintenance Phase

C.

Implementation Phase

D.

Initiation Phase

In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?

A.

Design

B.

Evaluation and acceptance

C.

Programming and training

D.

Initiation

Frank is the project manager of the NHH Project. He is working with the project team to create a plan to document the procedures to manage risks throughout the project. This document will define how risks will be identified and quantified. It will also define how contingency plans will be implemented by the project team. What document is Frank and the NHH Project team creating in this scenario?

A.

Risk management plan

B.

Project plan

C.

Project management plan

D.

Resource management plan

ISO 27003 is an information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Which of the following elements does this standard contain? Each correct answer represents a complete solution. Choose all that apply.

A.

Inter-Organization Co-operation

B.

Information Security Risk Treatment

C.

CSFs (Critical success factors)

D.

ystem requirements for certification bodies Managements

E.

Terms and Definitions

F.

Guidance on process approach

Which of the following acts is used to recognize the importance of information security to the economic and national security interests of the United States?

A.

Computer Misuse Act

B.

Lanham Act

C.

Computer Fraud and Abuse Act

D.

FISMA

Which of the following characteristics are described by the DIAP Information Readiness Assessment function? Each correct answer represents a complete solution. Choose all that apply.

A.

It provides for entry and storage of individual system data.

B.

It performs vulnerability/threat analysis assessment.

C.

It provides data needed to accurately assess IA readiness.

D.

It identifies and generates IA requirements.

Which of the following fields of management focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life?

A.

Configuration management

B.

Risk management

C.

Change management

D.

Procurement management

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

A.

File-based

B.

Network-based

C.

Anomaly-based

D.

Signature-based

Which of the following is NOT a responsibility of a data owner?

A.

Approving access requests

B.

Ensuring that the necessary security controls are in place

C.

Delegating responsibility of the day-to-day maintenance of the data protection mechanisms to the data custodian

D.

Maintaining and protecting data

Which of the following approaches can be used to build a security program? Each correct answer represents a complete solution. Choose all that apply.

A.

Right-Up Approach

B.

Left-Up Approach

C.

Top-Down Approach

D.

Bottom-Up Approach

Maria has been recently appointed as a Network Administrator in Gentech Inc. She has been tasked to perform network security testing to find out the vulnerabilities and shortcomings of the present network infrastructure. Which of the following testing approaches will she apply to accomplish this task?

A.

Gray-box testing

B.

White-box testing

C.

Black-box testing

D.

Unit testing

FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls are tested and reviewed?

A.

Level 4

B.

Level 5

C.

Level 2

D.

Level 3

E.

Level 1

You work as an analyst for Tech Perfect Inc. You want to prevent information flow that may cause a conflict of interest in your organization representing competing clients. Which of the following security models will you use?

A.

Bell-LaPadula model

B.

Chinese Wall model

C.

Clark-Wilson model

D.

Biba model

Which of the following plans is a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources?

A.

Contingency plan

B.

Continuity of Operations plan

C.

Disaster recovery plan

D.

Business Continuity plan

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

A.

Confidentiality

B.

Non-repudiation

C.

Authentication

D.

Integrity

Which of the following is an attack with IP fragments that cannot be reassembled?

A.

Password guessing attack

B.

Teardrop attack

C.

Dictionary attack

D.

Smurf attack

Which of the following is a patch management utility that scans one or more computers on a network and alerts a user if any important Microsoft security patches are missing and also provides links that enable those missing patches to be downloaded and installed?

A.

MABS

B.

ASNB

C.

MBSA

D.

IDMS

Which of the following governance bodies provides management, operational and technical controls to satisfy security requirements?

A.

Senior Management

B.

Business Unit Manager

C.

Information Security Steering Committee

D.

Chief Information Security Officer

Penetration tests are sometimes called white hat attacks because in a pen test, the good guys are attempting to break in. What are the different categories of penetration testing? Each correct answer represents a complete solution. Choose all that apply.

A.

Open-box

B.

Closed-box

C.

Zero-knowledge test

D.

Full-box

E.

Full-knowledge test

F.

Partial-knowledge test

Page: 1 / 6
Total 349 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved