Free ISC2 CSSLP Exam Actual Questions

The questions for CSSLP were last updated On Apr 17, 2025

At ValidExamDumps, we consistently monitor updates to the ISC2 CSSLP exam questions by ISC2. Whenever our team identifies changes in the exam questions,exam objectives, exam focus areas or in exam requirements, We immediately update our exam questions for both PDF and online practice exams. This commitment ensures our customers always have access to the most current and accurate questions. By preparing with these actual questions, our customers can successfully pass the ISC2 Certified Secure Software Lifecycle Professional exam on their first attempt without needing additional materials or study guides.

Other certification materials providers often include outdated or removed questions by ISC2 in their ISC2 CSSLP exam. These outdated questions lead to customers failing their ISC2 Certified Secure Software Lifecycle Professional exam. In contrast, we ensure our questions bank includes only precise and up-to-date questions, guaranteeing their presence in your actual exam. Our main priority is your success in the ISC2 CSSLP exam, not profiting from selling obsolete exam questions in PDF or Online Practice Test.

 

Question No. 1

Which of the following refers to a process that is used for implementing information security?

Show Answer Hide Answer
Correct Answer: C

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating,

describing, testing, and authorizing systems prior to or after a system is in operation. The C&A process is used extensively in the U.S. Federal

Government. Some C&A processes include FISMA, NIACAP, DIACAP, and DCID 6/3.

Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system, made

in support of security accreditation, to determine the extent to which the controls are implemented correctly, operating as intended, and

producing the desired outcome with respect to meeting the security requirements for the system.

Accreditation is the official management decision given by a senior agency official to authorize operation of an information system and to

explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals, based on the

implementation of an agreed-upon set of security controls.

Answer D is incorrect. Information Assurance (IA) is the practice of managing risks related to the use, processing, storage, and

transmission of information or data and the systems and processes used for those purposes. While focused dominantly on information in

digital form, the full range of IA encompasses not only digital but also analog or physical form. Information assurance as a field has grown

from the practice of information security, which in turn grew out of practices and procedures of computer security.

Answer A is incorrect. The classic information security model is used in the practice of Information Assurance (IA) to define assurance

requirements. The classic information security model, also called the CIA Triad, addresses three attributes of information and information

systems, confidentiality, integrity, and availability. This C-I-A model is extremely useful for teaching introductory and basic concepts of

information security and assurance; the initials are an easy mnemonic to remember, and when properly understood, can prompt systems

designers and users to address the most pressing aspects of assurance.

Answer B is incorrect. The Five Pillars model is used in the practice of Information Assurance (IA) to define assurance requirements. It

was promulgated by the U.S. Department of Defense (DoD) in a variety of publications, beginning with the National Information Assurance

Glossary, Committee on National Security Systems Instruction CNSSI-4009. Here is the definition from that publication: 'Measures that protect

and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.

These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.' The

Five Pillars model is sometimes criticized because authentication and non-repudiation are not attributes of information or systems; rather,

they are procedures or methods useful to assure the integrity and authenticity of information, and to protect the confidentiality of the same.


Question No. 2

Fill in the blank with an appropriate security type. applies the internal security policies of the software applications when they are deployed.

Show Answer Hide Answer
Correct Answer: A

security, the code of the software application controls the security behavior, and authentication decisions are made based on the business

logic, such as the user role or the task performed by the user in a specific security context.


Question No. 3

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

Show Answer Hide Answer
Correct Answer: B

Removing the IPP printing capability from a server is a good countermeasure against an IIS buffer overflow attack. A Network Administrator

should take the following steps to prevent a Web server from IIS buffer overflow attacks:

Conduct frequent scans for server vulnerabilities.

Install the upgrades of Microsoft service packs.

Implement effective firewalls.

Apply URLScan and IISLockdown utilities.

Remove the IPP printing capability.

Answer D is incorrect. The following are the DNS zone transfer countermeasures:

Do not allow DNS zone transfer using the DNS property sheet:

a.Open DNS.

b.Right-click a DNS zone and click Properties.

c.On the Zone Transfer tab, clear the Allow zone transfers check box.

Configure the master DNS server to allow zone transfers only from secondary DNS servers:

a.Open DNS.

b.Right-click a DNS zone and click Properties.

c.On the zone transfer tab, select the Allow zone transfers check box, and then do one of the following:

To allow zone transfers only to the DNS servers listed on the name servers tab, click on the Only to the servers listed on

the Name Server tab.

To allow zone transfers only to specific DNS servers, click Only to the following servers, and add the IP address of one or

more servers.

Deny all unauthorized inbound connections to TCP port 53.

Implement DNS keys and encrypted DNS payloads.

Answer A is incorrect. The following are the countermeasures against SNMP enumeration:

1.Removing the SNMP agent or disabling the SNMP service

2.Changing the default PUBLIC community name when 'shutting off SNMP' is not an option

3.Implementing the Group Policy security option called Additional restrictions for anonymous connections

4.Restricting access to NULL session pipes and NULL session shares

5.Upgrading SNMP Version 1 with the latest version

6.Implementing Access control list filtering to allow only access to the read-write community from approved stations or subnets

Answer C is incorrect. NetBIOS NULL session vulnerabilities are hard to prevent, especially if NetBIOS is needed as part of the

infrastructure. One or more of the following steps can be taken to limit NetBIOS NULL session vulnerabilities:

1.Null sessions require access to the TCP 139 or TCP 445 port, which can be disabled by a Network Administrator.

2.A Network Administrator can also disable SMB services entirely on individual hosts by unbinding WINS Client TCP/IP from the interface.

3.A Network Administrator can also restrict the anonymous user by editing the registry values:

a.Open regedit32, and go to HKLM\SYSTEM\CurrentControlSet\LSA.

b.Choose edit > add value.

Value name: RestrictAnonymous

Data Type: REG_WORD

Value: 2


Question No. 4

You work as an analyst for Tech Perfect Inc. You want to prevent information flow that may cause a conflict of interest in your organization representing competing clients. Which of the following security models will you use?

Show Answer Hide Answer
Correct Answer: B

The Chinese Wall Model is the basic security model developed by Brewer and Nash. This model prevents information flow that may cause a

conflict of interest in an organization representing competing clients. The Chinese Wall Model provides both privacy and integrity for data.

Answer D is incorrect. The Biba model is a formal state transition system of computer security policy that describes a set of access

control rules designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that

subjects may not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.

Answer C is incorrect. The Clark-Wilson model provides a foundation for specifying and analyzing an integrity policy for a computing

system. The model is primarily concerned with formalizing the notion of information integrity. Information integrity is maintained by preventing

corruption of data items in a system due to either error or malicious intent.

The model's enforcement and certification rules define data items and processes that provide the basis for an integrity policy. The core of the

model is based on the notion of a transaction.

Answer A is incorrect. The Bell-La Padula Model is a state machine model used for enforcing access control in government and military

applications. The model is a formal state transition model of computer security policy that describes a set of access control rules which use

security labels on objects and clearances for subjects. Security labels range from the most sensitive (e.g.,'Top Secret'), down to the least

sensitive (e.g., 'Unclassified' or 'Public').

The Bell-La Padula model focuses on data confidentiality and controlled access to classified information, in contrast to the Biba Integrity Model

which describes rules for the protection of data integrity.


Question No. 5

Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment?

Show Answer Hide Answer
Correct Answer: D

The Phase 3 of DITSCAP C&A is known as Validation. The goal of Phase 3 is to validate that the preceding work has produced an IS that

operates in a specified computing environment.

Answer C is incorrect. The goal of this phase is to define the C&A level of effort, identify the main C&A roles and responsibilities, and

create an agreement on the method for implementing the security requirements.

Answer A is incorrect. The goal of this phase is to obtain a fully integrated system for certification testing and accreditation.

Answer B is incorrect. This phase ensures that it will maintain an acceptable level of residual risk.