PDF Download CSSLP Certified Secure Software Lifecycle Professional
PDF Download CSSLP Certified Secure Software Lifecycle Professional
com
Question No. 1
Safeguards
om
Security controls applied to mitigate a threat before it materializes
.c
ck
Question No. 2
Open design
za
Authentication
Question No. 3
Non Repudiation
Page 1 of 14
Quizack.com
Federal Information Processing Standards
om
Question No. 4
.c
Protection against improper data alteration. It is a measure of software
resiliency and pertains to the modification of data and the reliable function of
the software - Data is internally and externally consistent
ck
Support policies at a granular and specific level - Can be characterized as
internal and external
za
Support for accreditation and certification bodies that audit and certify ISMS
Q
Question No. 5
Use directed graph to specify the rights that a subject can transfer to an
object or that a subject can take from another subject
Authentication
OWASP - ITIL
Page 2 of 14
Quizack.com
Question No. 6
om
Balancing act between the protection of IT assets and the cost of
implementing software security controls so that the risk is handled
approprietely. It includes: Preliminary assessement for the need of security
controls - Identification of security c
.c
Supporting Controls: Identification - crptographic key management - security
administration - system protections - Preventive Controls: authentication -
authorization - access control enforcement - non repudiation - Detection and
recovering controls:
ck
Secure applicatios running on secure hosts (systems) in a secure network
za
Question No. 7
Disallow the sharing of mechaniss that are common to more than one user or
Q
Question No. 8
Page 3 of 14
Quizack.com
Categories of controls
om
Uses comprehensive penetration testing to test the strength of the security
software in order to predict and analyze vulnerabilities
Question No. 9 .c
ck
OWASP testing guide
Question No. 10
ISO/IEC 21827:2008
Page 4 of 14
Quizack.com
Disallow the sharing of mechaniss that are common to more than one user or
process with different levels of privilege
om
Question No. 11
.c
Risk remains after the implementation of mitigating security controls
ck
Concept aims at ensuring that the appropriate levels of protection are
provided to secure configurable parameters that are needed for the software
to run
computation of risk.
of the software
Q
Question No. 12
Support for accreditation and certification bodies that audit and certify ISMS
Page 5 of 14
Quizack.com
model
Question No. 13
om
Security Concepts that need to be considered when designing and architecting
software: Least privilege - Compartmentalization (separation of duties) -
Defense in depth - Fail Secure - Keep it simple - Complete mediation - Open
Design - Least common m
.c
Security controls applied to mitigate a threat before it materializes
ck
Guidelines for quality software products - Six external quality characteristics
to measure quality of software: functionality - reliability - usability - efficiency -
maintainability - portability
za
Question No. 14
The likelihood that a threat can result into an incident. This is the overall risk
of a system
Page 6 of 14
Quizack.com
administration - system protections - Preventive Controls: authentication -
authorization - access control enforcement - non repudiation - Detection and
recovering controls:
Question No. 15
Vulnerability
The likelihood that a threat can result into an incident. This is the overall risk
om
of a system
.c
Risk calculation and rating methodology that are often used with STRIDE -
Rating performed accross 5 dimensions: Damage potential - Reproducibility -
Exploitability - Affected users - Discoverability
ck
A weakness or flaw that could be accidentally triggered or intentionally
exploited by an attacker - resulting in the breach or breakdown of the security
policy
za
Question No. 16
ui
Security Controls
Q
Specifies at a high level the 'what' and 'why' for security - Provides the
framework and point of reference that can be used to measure an
organization's posture - requires support of executive management to be
effective and enforceable
Page 7 of 14
Quizack.com
Question No. 17
om
the software - Data is internally and externally consistent
.c
Secure applicatios running on secure hosts (systems) in a secure network
ck
Question No. 18
Question No. 19
ISO/IEC 27001:2005
Page 8 of 14
Quizack.com
om
Security controls applied after a threat has been materialized
Question No. 20
provided to secure configurable parameters that are needed for the software
to run
Question No. 21
Least privilege
Disallow the sharing of mechaniss that are common to more than one user or
Page 9 of 14
Quizack.com
process with different levels of privilege
Entity should have the minimum access level access right to do the jo- The
right is given for a minimum amount of time necessary to complete the job
om
Question No. 22
Multifactor authentication
.c
Addresses the deniability of actions taken by either a user or the software on
behalf of the user - Can be accomplished by auditing access information
ck
Is recommended for validating access to system containing sensitive or critical
information (FFIEC guidance on authentication)
za
Question No. 23
Q
ISO/IEC 9216
Page 10 of 14
Quizack.com
Methodically designed - tested and reviewed - Semiformally designed - and
tested - Semiformally verified design and tested - Formally verified designed
and tested
Question No. 24
Implementation challenges
om
Methodically designed - tested and reviewed - Semiformally designed - and
tested - Semiformally verified design and tested - Formally verified designed
and tested
.c
Disallow the sharing of mechaniss that are common to more than one user or
process with different levels of privilege
ck
Support policies at a granular and specific level - Can be characterized as
internal and external
za
Question No. 25
ui
ISO/IEC 27005:2008
Page 11 of 14
Quizack.com
Question No. 26
27. DREAD
om
Risk calculation and rating methodology that are often used with STRIDE -
Rating performed accross 5 dimensions: Damage potential - Reproducibility -
Exploitability - Affected users - Discoverability
.c
Coding Standards (internal) - PCI DSS - NIST Standards - ISO Standards -
Federal Information Processing Standards
ck
Question No. 27
za
Phsychological acceptability
ui
Question No. 28
OCTAVE
Page 12 of 14
Quizack.com
om
security - develop and main
Question No. 29
Vulnerabilities repositories
.c
ck
Software or data it processed must be accessible by only those who are
authorized - It must be accessible only at the time that it is required.
areas of ISMS
Question No. 30
Integrity
Page 13 of 14
Quizack.com
Entity should have the minimum access level access right to do the jo- The
right is given for a minimum amount of time necessary to complete the job
om
.c
ck
za
ui
Q
Page 14 of 14