ISC CSSLP Certified Secure Software Lifecycle Professional Online Training
ISC CSSLP Online Training
The questions for CSSLP were last updated at Jul 27,2025.
- Exam Code: CSSLP
- Exam Name: Certified Secure Software Lifecycle Professional
- Certification Provider: ISC
- Latest update: Jul 27,2025
The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively.
Which of the following statements are true about ISSO and ISSE? Each correct answer represents a complete solution. Choose all that apply.
- A . An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).
- B . An ISSE provides advice on the continuous monitoring of the information system.
- C . An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).
- D . An ISSE provides advice on the impacts of system changes. E. An ISSO takes part in the development activities that are required to implement system changes.
In which of the following types of tests are the disaster recovery checklists distributed to the members of disaster recovery team and asked to review the assigned checklist?
- A . Parallel test
- B . Simulation test
- C . Full-interruption test
- D . Checklist test
SIMULATION
Fill in the blank with an appropriate phrase. models address specifications, requirements, design, verification and validation, and maintenance activities.
Which of the following security design patterns provides an alternative by requiring that a user’s authentication credentials be verified by the database before providing access to that user’s data?
- A . Secure assertion
- B . Authenticated session
- C . Password propagation
- D . Account lockout
Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?
- A . RTO
- B . RTA
- C . RPO
- D . RCO
Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls?
- A . Information Assurance (IA)
- B . Information systems security engineering (ISSE)
- C . Certification and accreditation (C&A)
- D . Risk Management
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company.
On the grounds of which of the following laws can the employee be prosecuted?
- A . Espionage law
- B . Trademark law
- C . Cyber law
- D . Copyright law
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company.
On the grounds of which of the following laws can the employee be prosecuted?
- A . Espionage law
- B . Trademark law
- C . Cyber law
- D . Copyright law
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company.
On the grounds of which of the following laws can the employee be prosecuted?
- A . Espionage law
- B . Trademark law
- C . Cyber law
- D . Copyright law
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company.
On the grounds of which of the following laws can the employee be prosecuted?
- A . Espionage law
- B . Trademark law
- C . Cyber law
- D . Copyright law