Discount Offer
Go Back on CSSLP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

CSSLP Practice Test


Page 20 out of 70 Pages

Topic 1: Volume A

Which of the following are examples of the application programming interface (API)? Each correct answer represents a complete solution. Choose three.


A.

HTML 


B.

PHP 


C.

.NET


D.

Perl 





B.
  

PHP 



C.
  

.NET



D.
  

Perl 



Explanation: Perl, .NET, and PHP are examples of the application programming interface (API). API is a set of routines, protocols, and tools that users can use to work with a component, application, or operating system. It consists of one or more DLLs that provide specific functionality. API helps in reducing the development time of applications by reducing application code. Most operating environments, such as MS-Windows, provide an API so that programmers can write applications consistent with the operating environment. Answer: A is incorrect. HTML stands for Hypertext Markup Language. It is a set of markup symbols or codes used to create Web pages and define formatting specifications. The markup tells the Web browser how to display the content of the Web page. 

The DoD 8500 policy series represents the Department's information assurance strategy. Which of the following objectives are defined by the DoD 8500 series? Each correct answer represents a complete solution. Choose all that apply.


A.

Defending systems


B.

Providing IA Certification and Accreditation


C.

Providing command and control and situational awareness


D.

Protecting information





A.
  

Defending systems



C.
  

Providing command and control and situational awareness



D.
  

Protecting information



Explanation: The various objectives of the DoD 8500 series are as follows: Protecting information Defending systems Providing command and control and situational awareness Making sure that the information assurance is integrated into processes Increasing security awareness throughout the DoD's workforce

Which of the following statements about the authentication concept of information security management is true? 


A.

It establishes the users' identity and ensures that the users are who they say they are.


B.

It ensures the reliable and timely access to resources.


C.

It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.


D.

It ensures that modifications are not made to data by unauthorized personnel or processes





A.
  

It establishes the users' identity and ensures that the users are who they say they are.



Explanation: The concept of authentication establishes the users' identity and ensures that the users are who they say they are. Answer: B is incorrect. The concept of availability ensures the reliable and timely access to data or resources. Answer: D is incorrect. The concept of integrity ensures that modifications are not made to data by unauthorized personnel or processes. Answer: C is incorrect. The concept of accountability determines the actions and behaviors of a single individual within a system, and identifies that particular individual.

Which of the following terms ensures that no intentional or unintentional unauthorized modification is made to data?


A.

Non-repudiation 


B.

Integrity 


C.

Authentication 


D.

Confidentiality 





B.
  

Integrity 



Explanation: Integrity ensures that no intentional or unintentional unauthorized modification is made to data. Answer: D is incorrect. Confidentiality refers to the protection of data against unauthorized access. Administrators can provide confidentiality by encrypting data. Answer: A is incorrect. Non-repudiation is a mechanism to prove that the sender really sent this message. Answer: C is incorrect. Authentication is the process of verifying the identity of a person or network host. 

DIACAP applies to the acquisition, operation, and sustainment of any DoD system that collects, stores, transmits, or processes unclassified or classified information since December 1997. What phases are identified by DIACAP? Each correct answer represents a complete solution. Choose all that apply.


A.

System Definition 


B.

Validation 


C.

Identification 


D.

Accreditation 


E.

Verification 


F.

Re-Accreditation





A.
  

System Definition 



B.
  

Validation 



E.
  

Verification 



F.
  

Re-Accreditation



Explanation: The Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) is a process defined by the United States Department of Defense (DoD) for managing risk. DIACAP replaced the former process, known as DITSCAP (Department of Defense Information Technology Security Certification and Accreditation Process), in 2006. DoD Instruction (DoDI) 8510.01 establishes a standard DoD-wide process with a set of activities, general tasks, and a management structure to certify and accredit an Automated Information System (AIS) that will maintain the Information Assurance (IA) posture of the Defense Information Infrastructure (DII) throughout the system's life cycle. DIACAP applies to the acquisition, operation, and sustainment of any DoD system that collects, stores, transmits, or processes unclassified or classified information since December 1997. It identifies four phases: 1.System Definition 2.Verification 3.Validation 4.Re-Accreditation 


Page 20 out of 70 Pages
Previous