Pass the ISC ISC Other Certification CSSLP Questions and answers with CertsForce

Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following process areas does the SSE-CMM define in the 'Project and Organizational Practices' category? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Provide Ongoing Skills and Knowledge


B.

Verify and Validate Security


C.

Manage Project Risk


D.

Improve Organization's System Engineering Process


Expert Solution
Questions # 12:

Martha registers a domain named Microsoft.in. She tries to sell it to Microsoft Corporation. The infringement of which of the following has she made?

Options:

A.

Copyright


B.

Trademark


C.

Patent


D.

Intellectual property


Expert Solution
Questions # 13:

You work as a project manager for BlueWell Inc. You with your team are using a method or a (technical) process that conceives the risks even if all theoretically possible safety measures would be applied. One of your team member wants to know that what is a residual risk. What will you reply to your team member?

Options:

A.

It is a risk that remains because no risk response is taken.


B.

It is a risk that can not be addressed by a risk response.


C.

It is a risk that will remain no matter what type of risk response is offered.


D.

It is a risk that remains after planned risk responses are taken.


Expert Solution
Questions # 14:

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).


B.

An ISSE provides advice on the continuous monitoring of the information system.


C.

An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).


D.

An ISSE provides advice on the impacts of system changes. E. An ISSO takes part in the development activities that are required to implement system changes.


Expert Solution
Questions # 15:

You are the project manager for GHY Project and are working to create a risk response for a negative risk. You and the project team have identified the risk that the project may not complete on time, as required by the management, due to the creation of the user guide for the software you're creating. You have elected to hire an external writer in order to satisfy the requirements and to alleviate the risk event. What type of risk response have you elected to use in this instance?

Options:

A.

Transference


B.

Exploiting


C.

Avoidance


D.

Sharing


Expert Solution
Questions # 16:

Which of the following tools is used to attack the Digital Watermarking?

Options:

A.

Steg-Only Attack


B.

Active Attacks


C.

2Mosaic


D.

Gifshuffle


Expert Solution
Questions # 17:

Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive Branch agencies?

Options:

A.

OMB


B.

NIST


C.

NSA/CSS


D.

DCAA


Expert Solution
Questions # 18:

The LeGrand Vulnerability-Oriented Risk Management method is based on vulnerability analysis and consists of four principle steps. Which of the following processes does the risk assessment step include? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Remediation of a particular vulnerability


B.

Cost-benefit examination of countermeasures


C.

Identification of vulnerabilities


D.

Assessment of attacks


Expert Solution
Questions # 19:

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. Which of the following participants are required in a NIACAP security assessment? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Certification agent


B.

Designated Approving Authority


C.

IS program manager


D.

Information Assurance Manager


E.

User representative


Expert Solution
Questions # 20:

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet?

Options:

A.

DAS


B.

IPsec


C.

IDS


D.

ACL


Expert Solution
Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions