Free CSSLP Exam Braindumps (page: 31)

Page 31 of 88

Which of the following programming languages are compiled into machine code and directly executed by the CPU of a computer system? Each correct answer represents a complete solution. Choose two.

  1. C
  2. Microosft.NET
  3. Java EE
  4. C++

Answer(s): A,D

Explanation:

C and C++ programming languages are unmanaged code. Unmanaged code is compiled into machine code and directly executed by the CPU of a computer system.
Answers C and B are incorrect. Java EE and Microsoft.Net are compiled into an intermediate code format.



Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?

  1. FITSAF
  2. FIPS
  3. TCSEC
  4. SSAA

Answer(s): C

Explanation:

Trusted Computer System Evaluation Criteria (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. TCSEC was used to evaluate, classify, and select computer systems being considered for the processing, storage, and retrieval of sensitive or classified information. It was replaced with the development of the Common Criteria international standard originally published in 2005. The TCSEC, frequently referred to as the Orange Book, is the centerpiece of the DoD Rainbow Series publications. Answer D is incorrect. System Security Authorization Agreement (SSAA) is an information security document used in the United States Department of Defense (DoD) to describe and accredit networks and systems. The SSAA is part of the Department of Defense Information Technology Security Certification and Accreditation Process, or DITSCAP (superseded by DIACAP). The DoD instruction (issues in December 1997, that describes DITSCAP and provides an outline for the SSAA document is DODI 5200.40. The DITSCAP application manual (DoD 8510.1- M), published in July 2000, provides additional details. Answer A is incorrect. FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. It provides an approach for federal agencies. It determines how federal agencies are meeting existing policy and establish goals. The main advantage of FITSAF is that it addresses the requirements of Office of Management and Budget (OMB). It also addresses the guidelines provided by the National Institute of Standards and Technology (NIsT). Answer B is incorrect. The Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States federal government for use by all non-military government agencies and by government contractors. Many FIPS standards are modified versions of standards used in the wider community (ANSI, IEEE, ISO, etc.). Some FIPS standards were originally developed by the U.S. government. For instance, standards for encoding data (e.g., country codes), but more significantly some encryption standards, such as the Data Encryption Standard (FIPS 46-3) and the Advanced Encryption Standard (FIPS 197). In 1994, NOAA (Noaa) began broadcasting coded signals called FIPS (Federal Information Processing System) codes along with their standard weather broadcasts from local stations. These codes identify the type of emergency and the specific geographic area (such as a county) affected by the emergency.



Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?

  1. Business continuity plan development
  2. Business impact assessment
  3. Scope and plan initiation
  4. Plan approval and implementation

Answer(s): A

Explanation:

The business continuity plan development refers to the utilization of the information collected in the Business Impact Analysis (BIA) for the creation of the recovery strategy plan to support the critical business functions. The information gathered from the BIA is mapped out to make a strategy for creating a continuity plan. The business continuity plan development process includes the areas of plan implementation, plan testing, and ongoing plan maintenance. This phase also consists of defining and documenting the continuity strategy. Answer C is incorrect. The scope and plan initiation process in BCP symbolizes the beginning of the BCP process. It emphasizes on creating the scope and the additional elements required to define the parameters of the plan. The scope and plan initiation phase embodies a check of the company's operations and support services. The scope activities include creating a detailed account of the work required, listing the resources to be used, and defining the management practices to be employed. Answer B is incorrect. The business impact assessment is a method used to facilitate business units to understand the impact of a disruptive event. This phase includes the execution of a vulnerability assessment. This process makes out the mission-critical areas and business processes that are important for the survival of business. It is similar to the risk assessment process. The function of a business impact assessment process is to create a document, which is used to help and understand what impact a disruptive event would have on the business. Answer D is incorrect. The plan approval and implementation process involves creating enterprise-wide awareness of the plan, getting the final senior management signoff, and implementing a maintenance procedure for updating the plan as required.



Which of the following refers to a process that is used for implementing information security?

  1. Classic information security model
  2. Five Pillars model
  3. Certification and Accreditation (C&A)
  4. Information Assurance (IA)

Answer(s): C

Explanation:

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. The C&A process is used extensively in the U.S. Federal Government. Some C&A processes include FISMA, NIACAP, DIACAP, and DCID 6/3. Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system, made in support of security accreditation, to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system. Accreditation is the official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals, based on the implementation of an agreed-upon set of security controls. Answer D is incorrect. Information Assurance (IA) is the practice of managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes. While focused dominantly on information in digital form, the full range of IA encompasses not only digital but also analog or physical form. Information assurance as a field has grown from the practice of information security, which in turn grew out of practices and procedures of computer security.
Answer A is incorrect. The classic information security model is used in the practice of Information Assurance (IA) to define assurance requirements. The classic information security model, also called the CIA Triad, addresses three attributes of information and information systems, confidentiality, integrity, and availability. This C-I-A model is extremely useful for teaching introductory and basic concepts of information security and assurance; the initials are an easy mnemonic to remember, and when properly understood, can prompt systems designers and users to address the most pressing aspects of assurance. Answer B is incorrect. The Five Pillars model is used in the practice of Information Assurance (IA) to define assurance requirements. It was promulgated by the U.S. Department of Defense (DoD) in a variety of publications, beginning with the National Information Assurance Glossary, Committee on National Security Systems Instruction CNSSI-4009. Here is the definition from that publication: "Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities." The Five Pillars model is sometimes criticized because authentication and non-repudiation are not attributes of information or systems; rather, they are procedures or methods useful to assure the integrity and authenticity of information, and to protect the confidentiality of the same.



Page 31 of 88



Post your Comments and Discuss ISC2 CSSLP exam with other Community members:

Rahul commented on December 04, 2024
Very informative
Anonymous
upvote

Luke commented on December 04, 2024
Are these question for the Salesforce Media Cloud Accredited Professional? Can someone answer, please
EUROPEAN UNION
upvote

Madhavisriram25@gmail.com, Madhavi commented on December 03, 2024
I need these dump and the certification name of the exam or link for these exam
Anonymous
upvote

Wendy commented on December 03, 2024
Great intellectual study!!!
Anonymous
upvote

Wendy commented on December 03, 2024
Great content to study!
Anonymous
upvote

Wendy commented on December 03, 2024
I appreciate that these questions are teaching me things that I do not know about the PC industry!!!
Anonymous
upvote

CarM commented on December 03, 2024
Is this test for Email Specialist Exam?
SPAIN
upvote

Babula Kumar Sahu commented on December 03, 2024
very helpful for exam
UNITED STATES
upvote

Asma commented on December 03, 2024
I share the same opinion! - The questions and answers are good in this portal, kindly please add comments as well for answers, so that it will be very hepful.
Anonymous
upvote

Tenmo commented on December 03, 2024
It is with great pleasure to announce that I passed my certification examination today. Congrats to me for being me! And thanks to this site for posting the questions.
INDIA
upvote

Evan Couture commented on December 03, 2024
These questions are exactly what you will see on exam day, but they are good study. The exam may have questions covering similar objectives, but you will still need to study the material and perform hands on labs to be fully prepared. I used certmaster learn, infosec labs, pentest+ for dummies, pluralsight, wordwall user(markutree has some useful matching exercises), quizlet, and of course this resource. Hope this helps.
Anonymous
upvote

Ajay Kumar Yadav commented on December 03, 2024
Great insight.
INDIA
upvote

Ajay Kumar Yadav commented on December 03, 2024
informative
INDIA
upvote

Ajay Kumar Yadav commented on December 03, 2024
Very informative
INDIA
upvote

Bini commented on December 02, 2024
I would like to see more questions related to CCSP
Anonymous
upvote

Bosco commented on December 02, 2024
I would like to try this Brain dumps
UGANDA
upvote

Aman commented on December 02, 2024
Very helpful
UNITED STATES
upvote

Director2 commented on December 02, 2024
is this still valid?
Anonymous
upvote

Meerwais commented on December 02, 2024
the best approach.
Anonymous
upvote

Chaw commented on December 02, 2024
I needed to do some note taking and marking some questions to go back and review but this online version does not have those features. So I bought the full version and used the PDF.
Singapore
upvote

gg commented on December 01, 2024
it seems ok the questions and answers look legit.
Anonymous
upvote

Priya commented on December 01, 2024
Help before exam good practice questions
INDIA
upvote

Priya commented on December 01, 2024
Very useful
INDIA
upvote

Sheffie commented on December 01, 2024
Helping me get used to the exam style
UNITED STATES
upvote

Sheffie commented on December 01, 2024
Helps me get used to the type of questions
UNITED STATES
upvote

African-Amazigh commented on December 01, 2024
is this Exam the real NCM-MCI 6.5 Exam ? is it valide ?
Anonymous
upvote

SPH commented on December 01, 2024
super helpful questions
UNITED STATES
upvote

Shean commented on November 30, 2024
Great deal of Friday deal of 50% off. Got my 3 exams and download the PDF files.
NETHERLANDS
upvote

Babu commented on November 30, 2024
I did this exam this past Friday. All went great. Passed with 94%.
India
upvote

Elimu commented on November 30, 2024
A good way to practice
Anonymous
upvote

Sobhash commented on November 30, 2024
To those who are going for this exam and wondering if any passed. I wrote this exam. The exam is extremely hard and tricky. Luckily I prepared well and bought the full version of this exam dump which included most of the exam questions. However some answers were incomplete. But overall a fantastic resource well worth the money.
UNITED STATES
upvote

Juan Alvarez commented on November 29, 2024
Good content
Anonymous
upvote

Chela commented on November 29, 2024
Great for Exam preparation! Did it in Nov and Passed the first attempt.
Anonymous
upvote

nahdus commented on November 29, 2024
all comments are original?
Anonymous
upvote