Discount Offer
Go Back on CSSLP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

CSSLP Practice Test

Whether you're a beginner or brushing up on skills, our CSSLP practice exam is your key to success. Our comprehensive question bank covers all key topics, ensuring you’re fully prepared.


Page 23 out of 70 Pages

Topic 2: Volume B

What are the subordinate tasks of the Implement and Validate Assigned IA Control phase in the DIACAP process? Each correct answer represents a complete solution. Choose all that apply.


A.

Conduct validation activities.


B.

Execute and update IA implementation plan. 


C.

Combine validation results in DIACAP scorecard. 


D.

Conduct activities related to the disposition of the system data and objects.





A.
  

Conduct validation activities.



B.
  

Execute and update IA implementation plan. 



C.
  

Combine validation results in DIACAP scorecard. 



Explanation: The Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) is a process defined by the United States Department of Defense (DoD) for managing risk. The subordinate tasks of the Implement and Validate Assigned IA Control phase in the DIACAP process are as follows: Execute and update IA implementation plan. Conduct validation activities. Combine validation results in the DIACAP scorecard. Answer: D is incorrect. The activities related to the disposition of the system data and objects are conducted in the fifth phase of the DIACAP process. The fifth phase of the DIACAP process is known as Decommission System. 

The Software Configuration Management (SCM) process defines the need to trace changes, and the ability to verify that the final delivered software has all of the planned enhancements that are supposed to be included in the release. What are the procedures that must be defined for each software project to ensure that a sound SCM process is implemented? Each correct answer represents a complete solution. Choose all that apply.


A.

Configuration status accounting


B.

Configuration change control


C.

Configuration identification


D.

Configuration audits 


E.

Configuration implementation


F.

Configuration deployment





A.
  

Configuration status accounting



B.
  

Configuration change control



C.
  

Configuration identification



D.
  

Configuration audits 



Explanation: The SCM process defines the need to trace changes, and the ability to verify that the final delivered software has all of the planned enhancements that are supposed to be included in the release. It identifies four procedures that must be defined for each software project to ensure that a sound SCM process is implemented. They are as follows: 1.Configuration identification: Configuration identification is the process of identifying the attributes that define every aspect of a configuration item. A configuration item is a product (hardware and/or software) that has an end-user purpose. These attributes are recorded in configuration documentation and baselined. 2.Configuration change control: Configuration change control is a set of processes and approval stages required to change a configuration item's attributes and to re-baseline them. 3.Configuration status accounting: Configuration status accounting is the ability to record and report on the configuration baselines associated with each configuration item at any moment of time. 4.Configuration audits: Configuration audits are broken into functional and physical configuration audits. They occur either at delivery or at the moment of effecting the change. A functional configuration audit ensures that functional and performance attributes of a configuration item are achieved, while a physical configuration audit ensures that a configuration item is installed in accordance with the requirements of its detailed design documentation.

In which of the following deployment models of cloud is the cloud infrastructure operated exclusively for an organization? 


A.

Public cloud


B.

Community cloud


C.

Private cloud


D.

Hybrid cloud





C.
  

Private cloud



Explanation: In private cloud, the cloud infrastructure is operated exclusively for an organization. The private cloud infrastructure is administered by the organization or a third party, and exists on premise and off premise. 

The Data and Analysis Center for Software (DACS) specifies three general principles for software assurance which work as a framework in order to categorize various secure design principles. Which of the following principles and practices does the General Principle 1 include? Each correct answer represents a complete solution. Choose two


A.

Principle of separation of privileges, duties, and roles


B.

Assume environment data is not trustworthy


C.

Simplify the design 


D.

Principle of least privilege 





A.
  

Principle of separation of privileges, duties, and roles



D.
  

Principle of least privilege 



Explanation: General Principle 1- Minimize the number of high-consequence targets includes the following principles and practices: Principle of least privilege Principle of separation of privileges, duties, and roles Principle of separation of domains Answer: B is incorrect. Assume environment data is not trustworthy principle is included in the General Principle 2. Answer: C is incorrect. Simplify the design principle is included in the General Principle 3.

You work as a security manager for BlueWell Inc. You are going through the NIST SP 800- 37 C&A methodology, which is based on four well defined phases. In which of the following phases of NIST SP 800-37 C&A methodology does the security categorization occur?


A.

Security Accreditation  


B.

Security Certification 


C.

Continuous Monitoring 


D.

Initiation 





D.
  

Initiation 



Explanation: The various phases of NIST SP 800-37 C&A are as follows: Phase 1: Initiation- This phase includes preparation, notification and resource identification. It performs the security plan analysis, update, and acceptance. Phase 2: Security Certification- The Security certification phase evaluates the controls and documentation. Phase 3: Security Accreditation- The security accreditation phase examines the residual risk for acceptability, and prepares the final security accreditation package. Phase 4: Continuous Monitoring-This phase monitors the configuration management and control, ongoing security control verification, and status reporting and documentation. 


Page 23 out of 70 Pages
Previous