Pass the ISC ISC Other Certification CSSLP Questions and answers with CertsForce

Viewing page 10 out of 11 pages
Viewing questions 91-100 out of questions
Questions # 91:

Who amongst the following makes the final accreditation decision?

Options:

A.

ISSE


B.

CRO


C.

DAA


D.

ISSO


Expert Solution
Questions # 92:

Security Test and Evaluation (ST&E) is a component of risk assessment. It is useful in discovering system vulnerabilities. For what purposes is ST&E used? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To implement the design of system architecture


B.

To determine the adequacy of security mechanisms, assurances, and other properties to enforce the security policy


C.

To assess the degree of consistency between the system documentation and its implementation


D.

To uncover design, implementation, and operational flaws that may allow the violation of security policy


Expert Solution
Questions # 93:

You work as a system engineer for BlueWell Inc. You want to verify that the build meets its data requirements, and correctly generates each expected display and report. Which of the following tests will help you to perform the above task?

Options:

A.

Performance test


B.

Functional test


C.

Reliability test


D.

Regression test


Expert Solution
Questions # 94:

Which of the following processes will you involve to perform the active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures?

Options:

A.

Penetration testing


B.

Baselining


C.

Risk analysis


D.

Compliance checking


Expert Solution
Questions # 95:

A part of a project deals with the hardware work. As a project manager, you have decided to hire a company to deal with all hardware work on the project. Which type of risk response is this?

Options:

A.

Exploit


B.

Mitigation


C.

Transference


D.

Avoidance


Expert Solution
Questions # 96:

The mission and business process level is the Tier 2. What are the various Tier 2 activities? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Developing an organization-wide information protection strategy and incorporating high-level information security requirements


B.

Defining the types of information that the organization needs, to successfully execute the stated missions and business processes


C.

Specifying the degree of autonomy for the subordinate organizations


D.

Defining the core missions and business processes for the organization


E.

Prioritizing missions and business processes with respect to the goals and objectives of the organization


Expert Solution
Questions # 97:

Which of the following is generally used in packages in order to determine the package or product tampering?

Options:

A.

Tamper resistance


B.

Tamper evident


C.

Tamper data


D.

Tamper proof


Expert Solution
Questions # 98:

In which type of access control do user ID and password system come under?

Options:

A.

Physical


B.

Technical


C.

Power


D.

Administrative


Expert Solution
Questions # 99:

In which of the following levels of exception safety are operations succeeded with full guarantee and fulfill all needs in the presence of exceptional situations?

Options:

A.

Commit or rollback semantics


B.

Minimal exception safety


C.

Failure transparency


D.

Basic exception safety


Expert Solution
Questions # 100:

In which of the following SDLC phases is the system's security features configured and enabled, the system is tested and installed or fielded, and the system is authorized for processing?

Options:

A.

Development/Acquisition Phase


B.

Operation/Maintenance Phase


C.

Implementation Phase


D.

Initiation Phase


Expert Solution
Viewing page 10 out of 11 pages
Viewing questions 91-100 out of questions