Pass the ISC ISC Other Certification CSSLP Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions
Questions # 21:

The IAM/CA makes certification accreditation recommendations to the DAA. The DAA issues accreditation determinations. Which of the following are the accreditation determinations issued by the DAA? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

IATT


B.

IATO


C.

DATO


D.

ATO


E.

ATT


Expert Solution
Questions # 22:

Which of the following are examples of the application programming interface (API)? Each correct answer represents a complete solution. Choose three.

Options:

A.

HTML


B.

PHP


C.

.NET


D.

Perl


Expert Solution
Questions # 23:

Which of the following statements about the availability concept of Information security management is true?

Options:

A.

It ensures that modifications are not made to data by unauthorized personnel or processes.


B.

It determines actions and behaviors of a single individual within a system.


C.

It ensures reliable and timely access to resources.


D.

It ensures that unauthorized modifications are not made to data by authorized personnel or processes.


Expert Solution
Questions # 24:

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

Options:

A.

Quantitative risk analysis


B.

Qualitative risk analysis


C.

Seven risk responses


D.

A risk probability-impact matrix


Expert Solution
Questions # 25:

Which of the following individuals inspects whether the security policies, standards, guidelines, and procedures are efficiently performed in accordance with the company's stated security objectives?

Options:

A.

Information system security professional


B.

Data owner


C.

Senior management


D.

Information system auditor


Expert Solution
Questions # 26:

Della work as a project manager for BlueWell Inc. A threat with a dollar value of $250,000 is expected to happen in her project and the frequency of threat occurrence per year is 0.01. What will be the annualized loss expectancy in her project?

Options:

A.

$2,000


B.

$2,500


C.

$3,510


D.

$3,500


Expert Solution
Questions # 27:

Fill in the blank with an appropriate phrase. models address specifications, requirements, design, verification and validation, and maintenance activities. A. Life cycle


Expert Solution
Questions # 28:

FIPS 199 defines the three levels of potential impact on organizations. Which of the following potential impact levels shows limited adverse effects on organizational operations, organizational assets, or individuals?

Options:

A.

Moderate


B.

Low


C.

Medium


D.

High


Expert Solution
Questions # 29:

Which of the following methods determines the principle name of the current user and returns the jav a.security.Principal object in the HttpServletRequest interface?

Options:

A.

getUserPrincipal()


B.

isUserInRole()


C.

getRemoteUser()


D.

getCallerPrincipal()


Expert Solution
Questions # 30:

Which of the following access control models are used in the commercial sector? Each correct answer represents a complete solution. Choose two.

Options:

A.

Biba model


B.

Clark-Biba model


C.

Clark-Wilson model


D.

Bell-LaPadula model


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions