ISC CSSLP Certified Secure Software Lifecycle Professional Online Training
ISC CSSLP Online Training
The questions for CSSLP were last updated at Jul 27,2025.
- Exam Code: CSSLP
- Exam Name: Certified Secure Software Lifecycle Professional
- Certification Provider: ISC
- Latest update: Jul 27,2025
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the pre-attack phase successfully: Information gathering Determination of network range Identification of active systems Location of open ports and applications Now, which of the following tasks should he perform next?
- A . Perform OS fingerprinting on the We-are-secure network.
- B . Map the network of We-are-secure Inc.
- C . Install a backdoor to log in remotely on the We-are-secure server.
- D . Fingerprint the services running on the we-are-secure network.
Which of the following DITSCAP C&A phases takes place between the signing of the initial version of the SSAA and the formal accreditation of the system?
- A . Phase 4
- B . Phase 3
- C . Phase 1
- D . Phase 2
In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?
- A . Full operational test
- B . Penetration test
- C . Paper test
- D . Walk-through test
You work as a systems engineer for BlueWell Inc.
Which of the following tools will you use to look outside your own organization to examine how others achieve their performance levels, and what processes they use to reach those levels?
- A . Benchmarking
- B . Six Sigma
- C . ISO 9001:2000
- D . SEI-CMM
Which of the following methods determines the principle name of the current user and returns the jav a.security.Principal object in the HttpServletRequest interface?
- A . getUserPrincipal()
- B . isUserInRole()
- C . getRemoteUser()
- D . getCallerPrincipal()
The NIST Information Security and Privacy Advisory Board (ISPAB) paper "Perspectives on Cloud Computing and Standards" specifies potential advantages and disdvantages of virtualization.
Which of the following disadvantages does it include? Each correct answer represents a complete solution. Choose all that apply.
- A . It increases capabilities for fault tolerant computing using rollback and snapshot features.
- B . It increases intrusion detection through introspection.
- C . It initiates the risk that malicious software is targeting the VM environment.
- D . It increases overall security risk shared resources.
- E . It creates the possibility that remote attestation may not work.
- F . It involves new protection mechanisms for preventing VM escape, VM detection, and VM-VM interference.
- G . It increases configuration effort because of complexity and composite system.
Which of the following are the types of access controls? Each correct answer represents a complete solution. Choose three.
- A . Physical
- B . Technical
- C . Administrative
- D . Automatic
What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process? Each correct answer represents a complete solution. Choose all that apply.
- A . Initiate IA implementation plan
- B . Develop DIACAP strategy
- C . Assign IA controls.
- D . Assemble DIACAP team
- E . Register system with DoD Component IA Program.
- F . Conduct validation activity.
Which of the following attacks causes software to fail and prevents the intended users from accessing software?
- A . Enabling attack
- B . Reconnaissance attack
- C . Sabotage attack
- D . Disclosure attack
FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems.
Which of the following FITSAF levels shows that the procedures and controls have been implemented?
- A . Level 2
- B . Level 3
- C . Level 5
- D . Level 1
- E . Level 4