ISC2 Certified Secure Software Lifecycle Professional CSSLP Exam Practice Test

Page: 1 / 14
Total 357 questions
Question 1

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?



Answer : D

BCP is a strategy to minimize the consequence of the instability and to allow for the continuation of business processes. The goal of BCP is to

minimize the effects of a disruptive event on a company, and is formed to avoid interruptions to normal business activity.

Business Continuity Planning (BCP) is the creation and validation of a practiced logistical plan for how an organization will recover and restore

partially or completely interrupted critical (urgent) functions within a predetermined time after a disaster or extended disruption. The logistical

plan is called a business continuity plan.

Answer B is incorrect. A contingency plan is a plan devised for a specific situation when things could go wrong. Contingency plans are

often devised by governments or businesses who want to be prepared for anything that could happen. Contingency plans include specific

strategies and actions to deal with specific variances to assumptions resulting in a particular problem, emergency, or state of affairs. They also

include a monitoring process and 'triggers' for initiating planned actions. They are required to help governments, businesses, or individuals to

recover from serious incidents in the minimum time with minimum cost and disruption.

Answer C is incorrect. Disaster recovery planning is a subset of a larger process known as business continuity planning and should

include planning for resumption of applications, data, hardware, communications (such as networking), and other IT infrastructure. A business

continuity plan (BCP) includes planning for non-IT related aspects such as key personnel, facilities, crisis communication, and reputation

protection, and should refer to the disaster recovery plan (DRP) for IT-related infrastructure recovery/continuity.

Answer A is incorrect. The Continuity Of Operation Plan (COOP) refers to the preparations and institutions maintained by the United

States government, providing survival of federal government operations in the case of catastrophic events. It provides procedures and

capabilities to sustain an organization's essential. COOP is the procedure documented to ensure persistent critical operations throughout any

period where normal operations are unattainable.


Question 2

Which of the following agencies is responsible for funding the development of many technologies such as computer networking, as well as NLS?



Answer : C

The Defense Advanced Research Projects Agency (DARPA) is an agency of the United States Department of Defense responsible for the

development of new technology for use by the military. DARPA has been responsible for funding the development of many technologies which

have had a major effect on the world, including computer networking, as well as NLS, which was both the first hypertext system, and an

important precursor to the contemporary ubiquitous graphical user interface.

DARPA supplies technological options for the entire Department, and is designed to be the 'technological engine' for transforming DoD.

Answer D is incorrect. The Defense Information Systems Agency is a United States Department of Defense combat support agency with

the goal of providing real-time information technology (IT) and communications support to the President, Vice President, Secretary of Defense,

the military Services, and the Combatant Commands.

DISA, a Combat Support Agency, engineers and provides command and control capabilities and enterprise infrastructure to continuously

operate and assure a global net-centric enterprise in direct support to joint warfighters, National level leaders, and other mission and coalition

partners across the full spectrum of operations.

Answer B is incorrect. The Defense Technical Information Center (DTIC) is a repository of scientific and technical documents for the

United States Department of Defense. DTIC serves the DoD community as the largest central resource for DoD and government-funded

scientific, technical, engineering, and business related information available today. DTIC's documents are available to DoD personnel and

defense contractors, with unclassified documents also available to the public.

DTIC's aim is to serve a vital link in the transfer of information among DoD personnel, DoD contractors, and potential contractors and other


Question 3

Which of the following steps of the LeGrand Vulnerability-Oriented Risk Management method determines the necessary compliance offered by risk management practices and assessment of risk levels?



Answer : A

Assessment, monitoring, and assurance determines the necessary compliance that are offered by risk management practices and assessment

of risk levels.


Question 4

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?



Answer : B

Non-repudiation is a mechanism which proves that the sender really sent a message. It provides an evidence of the identity of the senderand

message integrity. It also prevents a person from denying the submission or delivery of the message and the integrity of its contents.

Answer C is incorrect. Authentication is a process of verifying the identity of a person or network host.

Answer A is incorrect. Confidentiality ensures that no one can read a message except the intended receiver.

Answer D is incorrect. Integrity assures the receiver that the received message has not been altered in any way from the original.


Question 5

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?



Answer : D

In an insertion attack, an IDS accepts a packet and assumes that the host computer will also accept it. But in reality, when a host system

rejects the packet, the IDS accepts the attacking string that will exploit vulnerabilities in the IDS. Such attacks can badly infect IDS signatures

and IDS signature analysis.

Answer B is incorrect. In this approach, an attacker sends packets in such a manner that one packet fragment overlaps data from a

previous fragment. The information is organized in the packets in such a manner that when the victim's computer reassembles the packets, an

attack string is executed on the victim's computer. Since the attacking string is in fragmented form, IDS is unable to detect it.

Answer C is incorrect. In this approach, an attacker sends packets in such a manner that one packet fragment overwrites data from a

previous fragment. The information is organized into the packets in such a manner that when the victim's computer reassembles the packets,

an attack string is executed on the victim's computer. Since the attacking string is in fragmented form, IDS becomes unable to detect it.

Answer A is incorrect. An evasion attack is one in which an IDS rejects a malicious packet but the host computer accepts it. Since an IDS

has rejected it, it does not check the contents of the packet. Hence, using this technique, an attacker can exploit the host computer. In many

cases, it is quite simple for an attacker to send such data packets that can easily perform evasion attacks on an IDSs.


Question 6

What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process?

Each correct answer represents a complete solution. Choose all that apply.



Answer : A, B, C, D, E

The Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) is a process defined by the United States

Department of Defense (DoD) for managing risk.

The subordinate tasks of the Initiate and Plan IA C&A phase are as follows:

Register system with DoD Component IA Program.

Assign IA controls.

Assemble DIACAP team.

Develop DIACAP strategy.

Initiate IA implementation plan.

Answer F is incorrect. Validation activities are conducted in the second phase of the DIACAP process, i.e., Implement and Validate

Assigned IA Controls.


Question 7

Which of the following characteristics are described by the DIAP Information Readiness Assessment function? Each correct answer represents a complete solution. Choose all that apply.



Answer : B, C, D

The characteristics of the DIAP Information Readiness Assessment function are as follows :

It provides data needed to accurately assess IA readiness.

It identifies and generates IA requirements.

It performs vulnerability/threat analysis assessment.

Answer A is incorrect. It is a function performed by the ASSET system.


Page:    1 / 14   
Total 357 questions