ISC CSSLP Certified Secure Software Lifecycle Professional Online Training
ISC CSSLP Online Training
The questions for CSSLP were last updated at Jul 29,2025.
- Exam Code: CSSLP
- Exam Name: Certified Secure Software Lifecycle Professional
- Certification Provider: ISC
- Latest update: Jul 29,2025
Which of the following is a variant with regard to Configuration Management?
- A . A CI that has the same name as another CI but shares no relationship.
- B . A CI that particularly refers to a software version.
- C . A CI that has the same essential functionality as another CI but a bit different in some small manner.
- D . A CI that particularly refers to a hardware specification.
Which of the following is a variant with regard to Configuration Management?
- A . A CI that has the same name as another CI but shares no relationship.
- B . A CI that particularly refers to a software version.
- C . A CI that has the same essential functionality as another CI but a bit different in some small manner.
- D . A CI that particularly refers to a hardware specification.
Which of the following is a variant with regard to Configuration Management?
- A . A CI that has the same name as another CI but shares no relationship.
- B . A CI that particularly refers to a software version.
- C . A CI that has the same essential functionality as another CI but a bit different in some small manner.
- D . A CI that particularly refers to a hardware specification.
The organization level is the Tier 1 and it addresses risks from an organizational perspective.
What are the various Tier 1 activities? Each correct answer represents a complete solution. Choose all that apply.
- A . The organization plans to use the degree and type of oversight, to ensure that the risk management strategy is being effectively carried out.
- B . The level of risk tolerance.
- C . The techniques and methodologies an organization plans to employ, to evaluate information system-related security risks.
- D . The RMF primarily operates at Tier 1.
An asset with a value of $600,000 is subject to a successful malicious attack threat twice a year. The asset has an exposure of 30 percent to the threat.
What will be the annualized loss expectancy?
- A . $360,000
- B . $180,000
- C . $280,000
- D . $540,000
Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution. Choose all that apply.
- A . Editor
- B . Custodian
- C . Owner
- D . User
- E . Security auditor
Which of the following life cycle modeling activities establishes service relationships and message exchange paths?
- A . Service-oriented logical design modeling
- B . Service-oriented conceptual architecture modeling
- C . Service-oriented discovery and analysis modeling
- D . Service-oriented business integration modeling
You have a storage media with some data and you make efforts to remove this data. After performing this, you analyze that the data remains present on the media.
Which of the following refers to the above mentioned condition?
- A . Object reuse
- B . Degaussing
- C . Residual
- D . Data remanence
Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation.
Which of the following statements are true about Certification and Accreditation? Each correct answer represents a complete solution. Choose two.
- A . Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.
- B . Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.
- C . Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.
- D . Certification is the official management decision given by a senior agency official to authorize operation of an information system.
The Phase 1 of DITSCAP C&A is known as Definition Phase. The goal of this phase is to define the C&A level of effort, identify the main C&A roles and responsibilities, and create an agreement on the method for implementing the security requirements.
What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.
- A . Negotiation
- B . Registration
- C . Document mission need
- D . Initial Certification Analysis