Free Certified Secure Software Lifecycle Professional Exam CSSLP Exam Practice Test

UNLOCK FULL
CSSLP Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 72
Total Questions: 357
  • What are the various activities performed in the planning phase of the Software Assurance Acquisition process? Each correct answer represents a complete solution. Choose all that apply.

    Answer: A, C, D Next Question
  • Which of the following is an example of penetration testing?

    Answer: C Next Question
  • A part of a project deals with the hardware work. As a project manager, you have decided to hire a company to deal with all hardware work on the project. Which type of risk response is this?

    Answer: C Next Question
  • Which of the following sections come under the ISO/IEC 27002 standard?

    Answer: A, B, D Next Question
  • Which of the following methods offers a number of modeling practices and disciplines that contribute to a successful service-oriented life cycle management and modeling?

    Answer: A Next Question
  • Software Development Life Cycle (SDLC) is a logical process used by programmers to develop software. Which of the following SDLC phases meets the audit objectives defined below:System and data are validated.System meets all user requirements.System meets all control requirements.

    Answer: A Next Question
  • In which type of access control do user ID and password system come under?

    Answer: B Next Question
  • Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information assurance and the security posture of a system or site?

    Answer: B Next Question
  • Which of the following are the primary functions of configuration management?Each correct answer represents a complete solution. Choose all that apply.

    Answer: B, C, D Next Question
  • In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?

    Answer: C Next Question
Page: 1 / 72
Total Questions: 357