ISC CSSLP Certified Secure Software Lifecycle Professional Online Training
ISC CSSLP Online Training
The questions for CSSLP were last updated at Jul 30,2025.
- Exam Code: CSSLP
- Exam Name: Certified Secure Software Lifecycle Professional
- Certification Provider: ISC
- Latest update: Jul 30,2025
Which of the following NIST Special Publication documents provides a guideline on network security testing?
- A . NIST SP 800-42
- B . NIST SP 800-53A
- C . NIST SP 800-60
- D . NIST SP 800-53
- E . NIST SP 800-37
- F . NIST SP 800-59
Which of the following tools is used to attack the Digital Watermarking?
- A . Steg-Only Attack
- B . Active Attacks
- C . 2Mosaic
- D . Gifshuffle
You and your project team have identified the project risks and now are analyzing the probability and impact of the risks.
What type of analysis of the risks provides a quick and high-level review of each identified risk event?
- A . Quantitative risk analysis
- B . Qualitative risk analysis
- C . Seven risk responses
- D . A risk probability-impact matrix
What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?
- A . Project Management Information System
- B . Integrated Change Control
- C . Configuration Management System
- D . Scope Verification
You work as a project manager for BlueWell Inc. You with your team are using a method or a (technical) process that conceives the risks even if all theoretically possible safety measures would be applied. One of your team member wants to know that what is a residual risk.
What will you reply to your team member?
- A . It is a risk that remains because no risk response is taken.
- B . It is a risk that can not be addressed by a risk response.
- C . It is a risk that will remain no matter what type of risk response is offered.
- D . It is a risk that remains after planned risk responses are taken.
You are the project manager of the NNN project for your company. You and the project team are working together to plan the risk responses for the project. You feel that the team has successfully completed the risk response planning and now you must initiate what risk process it is.
Which of the following risk processes is repeated after the plan risk responses to determine if the overall project risk has been satisfactorily decreased?
- A . Quantitative risk analysis
- B . Risk identification
- C . Risk response implementation
- D . Qualitative risk analysis
Which of the following statements is true about residual risks?
- A . It is the probabilistic risk after implementing all security measures.
- B . It can be considered as an indicator of threats coupled with vulnerability.
- C . It is a weakness or lack of safeguard that can be exploited by a threat.
- D . It is the probabilistic risk before implementing all security measures.
To help review or design security controls, they can be classified by several criteria . One of these criteria is based on their nature.
According to this criterion, which of the following controls consists of incident response processes, management oversight, security awareness, and training?
- A . Compliance control
- B . Physical control
- C . Procedural control
- D . Technical control
A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark’s financial and personal details to another company.
Which of the following Internet laws has the credit card issuing company violated?
- A . Trademark law
- B . Security law
- C . Privacy law
- D . Copyright law
There are seven risks responses that a project manager can choose from.
Which risk response is appropriate for both positive and negative risk events?
- A . Acceptance
- B . Transference
- C . Sharing
- D . Mitigation