ISC CSSLP Certified Secure Software Lifecycle Professional Online Training
ISC CSSLP Online Training
The questions for CSSLP were last updated at Jul 30,2025.
- Exam Code: CSSLP
- Exam Name: Certified Secure Software Lifecycle Professional
- Certification Provider: ISC
- Latest update: Jul 30,2025
You work as a Security Manager for Tech Perfect Inc. In the organization, Syslog is used for computer system management and security auditing, as well as for generalized informational, analysis, and debugging messages. You want to prevent a denial of service (DoS) for the Syslog server and the loss of Syslog messages from other sources.
What will you do to accomplish the task?
- A . Use a different message format other than Syslog in order to accept data.
- B . Enable the storage of log entries in both traditional Syslog files and a database.
- C . Limit the number of Syslog messages or TCP connections from a specific source for a certain time period.
- D . Encrypt rotated log files automatically using third-party or OS mechanisms.
You work as a project manager for a company. The company has started a new security software project. The software configuration management will be used throughout the lifecycle of the project. You are tasked to modify the functional features and the basic logic of the software and then make them compatible to the initial design of the project.
Which of the following procedures of the configuration management will you follow to accomplish the task?
- A . Configuration status accounting
- B . Configuration control
- C . Configuration audits
- D . Configuration identification
Which of the following areas of information system, as separated by Information Assurance Framework, is a collection of local computing devices, regardless of physical location, that are interconnected via local area networks (LANs) and governed by a single security policy?
- A . Local Computing Environments
- B . Networks and Infrastructures
- C . Supporting Infrastructures
- D . Enclave Boundaries
Which of the following is a signature-based intrusion detection system (IDS) ?
- A . RealSecure
- B . StealthWatch
- C . Tripwire
- D . Snort
Which of the following statements about the availability concept of Information security management is true?
- A . It ensures that modifications are not made to data by unauthorized personnel or processes.
- B . It determines actions and behaviors of a single individual within a system.
- C . It ensures reliable and timely access to resources.
- D . It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization.
Which of the following are required to be addressed in a well designed policy? Each correct answer represents a part of the solution. Choose all that apply.
- A . What is being secured?
- B . Where is the vulnerability, threat, or risk?
- C . Who is expected to exploit the vulnerability?
- D . Who is expected to comply with the policy?
The Phase 4 of DITSCAP C&A is known as Post Accreditation. This phase starts after the system has been accredited in Phase 3.
What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.
- A . Security operations
- B . Maintenance of the SSAA
- C . Compliance validation
- D . Change management
- E . System operations
- F . Continue to review and refine the SSAA
You work as a security engineer for BlueWell Inc.
Which of the following documents will you use as a guide for the security certification and accreditation of Federal Information Systems?
- A . NIST Special Publication 800-60
- B . NIST Special Publication 800-53
- C . NIST Special Publication 800-37
- D . NIST Special Publication 800-59
Which of the following is an example of over-the-air (OTA) provisioning in digital rights management?
- A . Use of shared secrets to initiate or rebuild trust.
- B . Use of software to meet the deployment goals.
- C . Use of concealment to avoid tampering attacks.
- D . Use of device properties for unique identification.
The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations.
Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.
- A . Architectural components abstraction
- B . SOA value proposition
- C . Business traceability
- D . Disaster recovery planning
- E . Software assets reuse