Free CSSLP Exam Braindumps (page: 27)

Page 27 of 88

Which of the following testing methods tests the system efficiency by systematically selecting the suitable and minimum set of tests that are required to effectively cover the affected changes?

  1. Unit testing
  2. Integration testing
  3. Acceptance testing
  4. Regression testing

Answer(s): D

Explanation:

Regression testing focuses on finding defects after a major code change has occurred. Specifically, it seeks to uncover software regressions, or old bugs that have come back. Such regressions occur whenever software functionality that was previously working correctly stops working as intended. Typically, regressions occur as an unintended consequence of program changes, when the newly developed part of the software collides with the previously existing code. Regression testing tests the system efficiency by systematically selecting the suitable and minimum set of tests that are required to effectively cover the affected changes. Answer A is incorrect. Unit testing is a type of testing in which each independent unit of an application is tested separately. During unit testing, a developer takes the smallest unit of an application, isolates it from the rest of the application code, and tests it to determine whether it works as expected. Unit testing is performed before integrating these independent units into modules. The most common approach to unit testing requires drivers and stubs to be written. Drivers and stubs are programs. A driver simulates a calling unit, and a stub simulates a called unit. Answer C is incorrect. Acceptance testing is performed on the application before its implementation into the production environment. It is done either by a client or an application specialist to ensure that the software meets the requirement for which it was made. Answer B is incorrect. Integration testing is a software testing that seeks to verify the interfaces between components against a software design. Software components may be integrated in an iterative way or all together ("big bang"). Normally the former is considered a better practice since it allows interface issues to be localized more quickly and fixed. Integration testing works to expose defects in the interfaces and interaction between the integrated components (modules). Progressively larger groups of tested software components corresponding to elements of the architectural design are integrated and tested until the software works as a system.



Which of the following specifies access privileges to a collection of resources by using the URL mapping?

  1. Code Access Security
  2. Security constraint
  3. Configuration Management
  4. Access Management

Answer(s): B

Explanation:

Security constraint is a type of declarative security, which specifies the protection of web content. It also specifies access privileges to a collection of resources by using the URL mapping. A deployment descriptor is used to define the security constraint. Security constraint includes the following elements: Web resource collection Authorization constraint User data constraint Answer A is incorrect. Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft's solution to prevent untrusted code from performing privileged actions. When the CLR (common language runtime) loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the assembly belongs to. A code group contains a permission set (one or more permissions). Code that performs a privileged action will perform a code access demand, which will cause the CLR to walk up the call stack and examine the permission set granted to the assembly of each method in the call stack. The code groups and permission sets are determined by the administrator of the machine who defines the security policy. Answer D is incorrect. Access Management is used to grant authorized users the right to use a service, while preventing access to non- authorized users. The Access Management process essentially executes policies defined in IT Security Management. It is sometimes also referred to as Rights Management or Identity Management. It is part of Service Operation and the owner of Access Management is the Access Manager. Access Management is added as a new process to ITIL V3. The sub-processes of Access Management are as follows: Maintain Catalogue of User Roles and Access Profiles Manage User Access Requests Answer C is incorrect. Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. It tracks all of the individual Configuration Items (CI) in an IT system, which may be as simple as a single server, or as complex as the entire IT department. In large organizations a configuration manager may be appointed to oversee and manage the CM process.



You are the project manager of QSL project for your organization. You are working with your project team and several key stakeholders to create a diagram that shows how various elements of a system interrelate and the mechanism of causation within the system. What diagramming technique are you using as a part of the risk identification process?

  1. Cause and effect diagrams
  2. Influence diagrams
  3. Predecessor and successor diagramming
  4. System or process flowcharts

Answer(s): D

Explanation:

In this example you are using a system or process flowchart. These can help identify risks within the process flow, such as bottlenecks or redundancy. Answer A is incorrect. A cause and effect diagram, also known as an Ishikawa or fishbone diagram, can reveal causal factors to the effect to be solved. Answer B is incorrect. An influence diagram shows causal influences, time ordering of events and relationships among variables and outcomes. Answer C is incorrect. Predecessor and successor diagramming is not a valid risk identification term.



Which of the following security models characterizes the rights of each subject with respect to every object in the computer system?

  1. Clark-Wilson model
  2. Bell-LaPadula model
  3. Biba model
  4. Access matrix

Answer(s): D

Explanation:

The access matrix or access control matrix is an abstract, formal security model of protection state in computer systems that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W. Lampson in 1971. According to the access matrix model, the protection state of a computer system can be abstracted as a set of objects 'O', that is the set of entities that needs to be protected (e.g. processes, files, memory pages) and a set of subjects 'S' that consists of all active entities (e.g. users, processes). Further there exists a set of rights 'R' of the form r(s,o), where s S, o O and r(s,o) R. A right thereby specifies the kind of access a subject is allowed to process with regard to an object. Answer B is incorrect. The Bell-La Padula Model is a state machine model used for enforcing access control in government and military applications. The model is a formal state transition model of computer security policy that describes a set of access control rules which use security labels on objects and clearances for subjects. Security labels range from the most sensitive (e.g.,"Top Secret"), down to the least sensitive (e.g., "Unclassified" or "Public"). The Bell-La Padula model focuses on data confidentiality and controlled access to classified information, in contrast to the Biba Integrity Model which describes rules for the protection of data integrity. Answer A is incorrect. The Clark-Wilson model provides a foundation for specifying and analyzing an integrity policy for a computing system. The model is primarily concerned with formalizing the notion of information integrity. Information integrity is maintained by preventing corruption of data items in a system due to either error or malicious intent. The model's enforcement and certification rules define data items and processes that provide the basis for an integrity policy. The core of the model is based on the notion of a transaction. Answer C is incorrect. The Biba model is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that subjects may not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.



Page 27 of 88



Post your Comments and Discuss ISC2 CSSLP exam with other Community members:

Sumeet G Hongekar commented on December 21, 2024
I am eger to write cad exaam
UNITED STATES
upvote

KAREEM ROFIAT BOLANLE commented on December 21, 2024
not yet written the exam
Anonymous
upvote

Subham commented on December 21, 2024
Good set of question for practice
Anonymous
upvote

Krish commented on December 20, 2024
Good to have test papers
INDIA
upvote

Ashish Sharma commented on December 20, 2024
Very elaborative explanation and apt questions
CANADA
upvote

Ashish Sharma commented on December 20, 2024
Very Useful
CANADA
upvote

Ashwani commented on December 20, 2024
Nice questions
UNITED KINGDOM
upvote

hardik commented on December 20, 2024
Very good content
UNITED STATES
upvote

Test commented on December 20, 2024
its helpful
Anonymous
upvote

haardik commented on December 20, 2024
Good so far
UNITED STATES
upvote

priya commented on December 20, 2024
good to prepare for the exam
Anonymous
upvote

Nagaraj commented on December 20, 2024
The questions help me to review
Anonymous
upvote

Reagan commented on December 20, 2024
Very Useful
Anonymous
upvote

Anonymous commented on December 20, 2024
definitely a perfect set of questions
Anonymous
upvote

DD commented on December 20, 2024
Preparing for exam
Anonymous
upvote

Anonymous1 commented on December 20, 2024
Nice questions
Anonymous
upvote

PrepGoku commented on December 20, 2024
Great list of questions, with full explaination
Anonymous
upvote

Hemlata commented on December 20, 2024
Great content
INDIA
upvote

Nicholos J Frates commented on December 20, 2024
I just passed the Salesforce-AI-Associate exam recently! my Result Card: https://docs.google.com/document/d/1CicoY5IGQwyyanVV_cCEUE2jFT86tyl3FZ_hA6Q_BiM
Anonymous
upvote

Hemlata commented on December 20, 2024
It is useful.
INDIA
upvote

Koomi commented on December 20, 2024
Great Content
Anonymous
upvote

Aamamm commented on December 20, 2024
useful for certfication
UNITED STATES
upvote

Preeti commented on December 20, 2024
How many questions in exam was from dump who give exam recently?
INDIA
upvote

Preeti commented on December 20, 2024
Have any of you taken the exam recently and passed just by using this dump?
INDIA
upvote

gill commented on December 20, 2024
nice nice nice
Anonymous
upvote

Hitesh commented on December 20, 2024
good practice questions available here
UNITED STATES
upvote

KT commented on December 20, 2024
I passed using this dumps.
Anonymous
upvote

Hassan commented on December 19, 2024
Quite challenging and interesting
Anonymous
upvote

mke commented on December 19, 2024
so far so good
UNITED STATES
upvote

JP commented on December 19, 2024
Good so far
UNITED STATES
upvote

Anyah Vincent Ndubuisi commented on December 19, 2024
Microsoft SC 200 SOC, is awesomely good enough for every cybersecurity specialist. Well detailed for freshers also. From Anyah Vincent.Nigeria.
Anonymous
upvote

Shehan commented on December 19, 2024
Superb stuff
Anonymous
upvote

gege commented on December 19, 2024
The questions looks promising and well formatted. But has anyone passed this exam recently? I have heard the exam is very very hard.
Anonymous
upvote

Tejaswini commented on December 19, 2024
For my understanding
Anonymous
upvote