ISC2 Certified Secure Software Lifecycle Professional Exam Practice Test

Page: 1 / 14
Total 357 questions
Question 1

Fill in the blank with an appropriate phrase The is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity.

See Below Explanation:

The Biba model is a formal state transition system of computer security policy that describes a set of access control rules

designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that subjects may

not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.




Answer : A

The Biba model is a formal state transition system of computer security policy that describes a set of access control rules

designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that subjects may

not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.


Question 2

In which of the following deployment models of cloud is the cloud infrastructure administered by the organizations or a third party? Each correct answer represents a complete solution. Choose two.



Answer : A, D

In private cloud, the cloud infrastructure is operated exclusively for an organization. The private cloud infrastructure is administered by the

organization or a third party, and exists on premise and off premise.

In community cloud, the cloud infrastructure is shared by a number of organizations and supports a particular community. The community cloud

infrastructure is administered by the organizations or a third party and exists on premise or off premise.

Answer B is incorrect. In public cloud, the cloud infrastructure is administered by an organization that sells cloud services.

Answer C is incorrect. In hybrid cloud, the cloud infrastructure is administered by both, i.e., an organization and a third party.


Question 3

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?



Answer : B

A full-interruption test includes the operations that shut down at the primary site and are shifted to the recovery site according to the disaster

recovery plan. It operates just like a parallel test. The full-interruption test is very expensive and difficult to arrange. Sometimes, it causes a

major disruption of operations if the test fails.

Answer A is incorrect. The structured walk-through test is also known as the table-top exercise. In structured walk-through test, the

team members walkthrough the plan to identify and correct weaknesses and how they will respond to the emergency scenarios by stepping

in the course of the plan. It is the most effective and competent way to identify the areas of overlap in the plan before conducting more

challenging training exercises.

Answer C is incorrect. A parallel test includes the next level in the testing procedure, and relocates the employees to an alternate

recovery site and implements site activation procedures. These employees present with their disaster recovery responsibilities as they would

for an actual disaster. The disaster recovery sites have full responsibilities to conduct the day-to-day organization's business.

Answer D is incorrect. A simulation test is a method used to test the disaster recovery plans. It operates just like a structured walk-

through test. In the simulation test, the members of a disaster recovery team present with a disaster scenario and then, discuss on

appropriate responses. These suggested responses are measured and some of them are taken by the team. The range of the simulation test

should be defined carefully for avoiding excessive disruption of normal business activities.


Question 4

The NIST ITL Cloud Research Team defines some primary and secondary technologies as the fundamental elements of cloud computing in its "Effectively and Securely Using the Cloud Computing Paradigm" presentation. Which of the following technologies are included in the primary technologies?

Each correct answer represents a complete solution. Choose all that apply.



Answer : B, C, D

The primary technologies defined by the NIST ITL Cloud Research Team in its 'Effectively and Securely Using the Cloud Computing Paradigm'

presentation are as follows:

Virtualization

Grid technology

SOA (Service Oriented Architecture)

Distributed computing

Broadband network

Browser as a platform

Free and open source software

Answer A is incorrect. It is defined as the secondary technology.


Question 5

Which of the following can be used to accomplish authentication?

Each correct answer represents a complete solution. Choose all that apply.



Answer : B, C, D

The following can be used to accomplish authentication:

1.Password

2.Biometrics

3.Token

A password is a secret word or string of characters that is used for authentication, to prove identity, or gain access to a resource.


Question 6

Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the U.S. Federal Government information security standards? Each correct answer represents a complete solution. Choose all that apply.



Answer : A, C, D

Following are the various U.S. Federal Government information security standards:

AC Access Control

AT Awareness and Training

AU Audit and Accountability

CA Certification, Accreditation, and Security Assessments

CM Configuration Management

CP Contingency Planning

IA Identification and Authentication

IR Incident Response

MA Maintenance

MP Media Protection

PE Physical and Environmental Protection

PL Planning

PS Personnel Security

RA Risk Assessment

SA System and Services Acquisition

SC System and Communications Protection

SI System and Information Integrity

Answer B is incorrect. Information systems acquisition, development, and maintenance is an International information security

standard.


Question 7

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. You have searched all open ports of the we-are-secure server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting. Which of the following tools can you use to accomplish the task?



Answer : D

According to the scenario, you have searched all open ports of the we-are-secure server. Now you want to perform the next information-

gathering step, i.e., passive OS fingerprinting. For this, you will use the P0f tool to accomplish the task. P0f is a passive OS fingerprinting tool

that is used to identify the operating system of a target host simply by examining captured packets even when the device is behind a packet

firewall. It does not generate any additional direct or indirect network traffic. P0f can also be used to gather various information, such as

firewall presence, NAT use (for policy enforcement), existence of a load balancer setup, the distance to the remote system and its uptime, etc.

Answer C is incorrect. Nmap is used for active OS fingerprinting. Nmap is a free open-source utility for network exploration and security

auditing. It is used to discover computers and services on a computer network, thus creating a 'map' of the network. Just like many simple

port scanners, Nmap is capable of discovering passive services. In addition, Nmap may be able to determine various details about the remote

computers. These include operating system, device type, uptime, software product used to run a service, exact version number of that

product, presence of some firewall techniques and, on a local area network, even vendor of the remote network card. Nmap runs on Linux,

Microsoft Windows etc.

Answer A is incorrect. SuperScan is a TCP/UDP port scanner. It also works as a ping sweeper and hostname resolver. It can ping a

given range of IP addresses and resolve the host name of the remote system.

The features of SuperScan are as follows:

It scans any port range from a built-in list or any given range.

It performs ping scans and port scans using any IP range.

It modifies the port list and port descriptions using the built in editor.

It connects to any discovered open port using user-specified 'helper' applications.

It has the transmission speed control utility.

Answer B is incorrect. NBTscan is a scanner that scans IP networks for NetBIOS name information. It sends a NetBIOS status query to

each address in a supplied range and lists received information in human readable form. It displays IP address, NetBIOS computer name,

logged-in user name and MAC address of each responded host. NBTscan works in the same manner as nbtstat, but it operates on a range of

addresses instead of just one.


Page:    1 / 14   
Total 357 questions