Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ISC Other Certification CSSLP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CSSLP Premium Access

View all detail and faqs for the CSSLP exam


497 Students Passed

90% Average Score

97% Same Questions
Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following ISO standards provides guidelines for accreditation of an organization that is concerned with certification and registration related to ISMS?

Options:

A.

ISO 27006

B.

ISO 27005

C.

ISO 27003

D.

ISO 27004

Questions # 2:

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

Options:

A.

Cold site

B.

Off site

C.

Warm site

D.

Hot site

Questions # 3:

Which of the following security issues does the Bell-La Padula model focus on?

Options:

A.

Authorization

B.

Confidentiality

C.

Integrity

D.

Authentication

Questions # 4:

In which of the following deployment models of cloud is the cloud infrastructure operated exclusively for an organization?

Options:

A.

Public cloud

B.

Community cloud

C.

Private cloud

D.

Hybrid cloud

Questions # 5:

Which of the following is a malicious exploit of a website, whereby unauthorized commands are transmitted from a user trusted by the website?

Options:

A.

Cross-Site Scripting

B.

Injection flaw

C.

Side channel attack

D.

Cross-Site Request Forgery

Questions # 6:

Which of the following programming languages are compiled into machine code and directly executed by the CPU of a computer system? Each correct answer represents a complete solution. Choose two.

Options:

A.

C

B.

Microosft.NET

C.

Java EE

D.

C++

Questions # 7:

The Web resource collection is a security constraint element summarized in the Java Servlet Specification v2.4. Which of the following elements does it include? Each correct answer represents a complete solution. Choose two.

Options:

A.

HTTP methods

B.

Role names

C.

Transport guarantees

D.

URL patterns

Questions # 8:

You work as a Security Manager for Tech Perfect Inc. The company has a Windows based network. It is required to determine compatibility of the systems with custom applications. Which of the following techniques will you use to accomplish the task?

Options:

A.

Safe software storage

B.

Antivirus management

C.

Backup control

D.

Software testing

Questions # 9:

Which of the following activities are performed by the 'Do' cycle component of PDCA (plan-do-check-act)? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It detects and responds to incidents properly.

B.

It determines controls and their objectives.

C.

It manages resources that are required to achieve a goal.

D.

It performs security awareness training.

E.

It operates the selected controls.

Questions # 10:

Which of the following types of obfuscation transformation increases the difficulty for a de-obfuscation tool so that it cannot extract the true application from the obfuscated version?

Options:

A.

Preventive transformation

B.

Data obfuscation

C.

Control obfuscation

D.

Layout obfuscation

Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.