Free CSSLP Exam Braindumps (page: 8)

Page 8 of 88

Which of the following DITSCAP C&A phases takes place between the signing of the initial version of the SSAA and the formal accreditation of the system?

  1. Phase 4
  2. Phase 3
  3. Phase 1
  4. Phase 2

Answer(s): D

Explanation:

The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to obtain a fully integrated system for certification testing and accreditation. This phase takes place between the signing of the initial version of the SSAA and the formal accreditation of the system. This phase verifies security requirements during system development.
Answers C, B, and A are incorrect. These phases do not take place between the signing of the initial version of the SSAA and the formal accreditation of the system.



In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?

  1. Full operational test
  2. Penetration test
  3. Paper test
  4. Walk-through test

Answer(s): B

Explanation:

A penetration testing is a method of evaluating the security of a computer system or network by simulating an attack from a malicious source. The process involves an active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker, and can involve active exploitation of security vulnerabilities. Any security issues that are found will be presented to the system owner together with an assessment of their impact and often with a proposal for mitigation or a technical solution. The intent of a penetration test is to determine feasibility of an attack and the amount of business impact of a successful exploit, if discovered. It is a component of a full security audit. Answer C is incorrect. A paper test is the least complex test in the disaster recovery and business continuity testing approaches. In this test, the BCP/DRP plan documents are distributed to the appropriate managers and BCP/DRP team members for review, markup, and comment. This approach helps the auditor to ensure that the plan is complete and that all team members are familiar with their responsibilities within the plan. Answer D is incorrect. A walk-through test is an extension of the paper testing in the business continuity and disaster recovery process. In this testing methodology, appropriate managers and BCP/DRP team members discuss and walk through procedures of the plan. They also discuss the training needs, and clarification of critical plan elements. Answer A is incorrect. A full operational test includes all team members and participants in the disaster recovery and business continuity process. This full operation test involves the mobilization of personnel. It restores operations in the same manner as an outage or disaster would. The full operational test extends the preparedness test by including actual notification, mobilization of resources, processing of data, and utilization of backup media for restoration.



You work as a systems engineer for BlueWell Inc. Which of the following tools will you use to look outside your own organization to examine how others achieve their performance levels, and what processes they use to reach those levels?

  1. Benchmarking
  2. Six Sigma
  3. ISO 9001:2000
  4. SEI-CMM

Answer(s): A

Explanation:

Benchmarking is the tool used by system assessment process to provide a point of reference by which performance measurements can be reviewed with respect to other organizations. Benchmarking is also recognized as Best Practice Benchmarking or Process Benchmarking. It is a process used in management and mostly useful for strategic management. It is the process of comparing the business processes and performance metrics including cost, cycle time, productivity, or quality to another that is widely considered to be an industry standard benchmark or best practice. It allows organizations to develop plans on how to implement best practice with the aim of increasing some aspect of performance. Benchmarking might be a one-time event, although it is frequently treated as a continual process in which organizations continually seek out to challenge their practices. It allows organizations to develop plans on how to make improvements or adapt specific best practices, usually with the aim of increasing some aspect of performance. Answer C is incorrect. The ISO 9001:2000 standard combines the three standards 9001, 9002, and 9003 into one, called 9001. Design and development procedures are required only if a company does in fact engage in the creation of new products. The 2000 version sought to make a radical change in thinking by actually placing the concept of process management front and center ("Process management" was the monitoring and optimizing of a company's tasks and activities, instead of just inspecting the final product). The ISO 9001:2000 version also demands involvement by upper executives, in order to integrate quality into the business system and avoid delegation of quality functions to junior administrators. Another goal is to improve effectiveness via process performance metrics numerical measurement of the effectiveness of tasks and activities. Expectations of continual process improvement and tracking customer satisfaction were made explicit. Answer B is incorrect. Six Sigma is a business management strategy, initially implemented by Motorola. As of 2009 it enjoys widespread application in many sectors of industry, although its application is not without controversy. Six Sigma seeks to improve the quality of process outputs by identifying and removing the causes of defects and variability in manufacturing and business processes. It uses a set of quality management methods, including statistical methods, and creates a special infrastructure of people within the organization ("Black Belts", "Green Belts", etc.) who are experts in these methods. Each Six Sigma project carried out within an organization follows a defined sequence of steps and has quantified financial targets (cost reduction or profit increase). The often used Six Sigma symbol is as follows:

Answer D is incorrect. Capability Maturity Model Integration (CMMI) was created by Software Engineering Institute (SEI). CMMI in software engineering and organizational development is a process improvement approach that provides organizations with the essential elements for effective process improvement. It can be used to guide process improvement across a project, a division, or an entire organization. CMMI can help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide guidance for quality processes, and provide a point of reference for appraising current processes. CMMI is now the de facto standard for measuring the maturity of any process. Organizations can be assessed against the CMMI model using Standard CMMI Appraisal Method for Process Improvement (SCAMPI).



Which of the following methods determines the principle name of the current user and returns the jav A.security.Principal object in the HttpServletRequest interface?

  1. getUserPrincipal()
  2. isUserInRole()
  3. getRemoteUser()
  4. getCallerPrincipal()

Answer(s): A

Explanation:

The getUserPrincipal() method determines the principle name of the current user and returns the java.security.Principal object. The java.security.Principal object contains the remote user name. The value of the getUserPrincipal() method returns null if no user is authenticated. Answer C is incorrect. The getRemoteUser() method returns the user name that is used for the client authentication. The value of the getRemoteUser() method returns null if no user is authenticated. Answer B is incorrect. The isUserInRole() method determines whether the remote user is granted a specified user role. The value of the isUserInRole() method returns true if the remote user is granted the specified user role; otherwise it returns false. Answer D is incorrect. The getCallerPrincipal() method is used to identify a caller using a java.security.Principal object. It is not used in the HttpServletRequest interface.



Page 8 of 88



Post your Comments and Discuss ISC2 CSSLP exam with other Community members:

amrith commented on October 20, 2024
Documentation
Anonymous
upvote

Raj commented on October 20, 2024
Great article! I especially appreciated the way you broke down the questions
UNITED STATES
upvote

Jim commented on October 20, 2024
Some of the questions are tought. Need to practice more..
UNITED STATES
upvote

Jim commented on October 20, 2024
Good site for Salesforce certification
UNITED STATES
upvote

Tom commented on October 20, 2024
This is a very good resource
UNITED STATES
upvote

Marcellus Werifah commented on October 20, 2024
Verified answers
UNITED STATES
upvote

samir commented on October 20, 2024
good practice
AUSTRIA
upvote

Patric commented on October 20, 2024
The main thing about this exam dump is that the PDF is not free. And that is what I needed. So I had to pay for that but they offer 50% discount if you buy 2 or more exams.
Spain
upvote

Nathan commented on October 20, 2024
Using dumps are my last resort. And that is what I ended up using with this exam to pass. The exam is extremely difficult.
France
upvote

Marcellus Werifah commented on October 20, 2024
Who decides what is the correct in case of conflicts
UNITED STATES
upvote

Marcellus Werifah commented on October 20, 2024
Novice. Would need detailed explanation of any questions
UNITED STATES
upvote

Maya commented on October 20, 2024
It would be great if all answers are supported by reference link.
UNITED KINGDOM
upvote

Maya commented on October 20, 2024
good material
UNITED KINGDOM
upvote

Jay commented on October 20, 2024
Interesting selection of questions
GREECE
upvote

Vinod Kumar Ramaswamy commented on October 20, 2024
ITS VERY USEFUL
UNITED KINGDOM
upvote

Srikanth commented on October 20, 2024
Useful to prepare for the exam
Anonymous
upvote

Alex commented on October 20, 2024
This exam is super duper hard. So prepare for it guys. I only passed it because of these questions. God bless the owner of this site.
UNITED STATES
upvote

Petrious commented on October 20, 2024
The site provides good content and very reliable support team. Very quick to reply to questions.
GERMANY
upvote

Rashmi commented on October 20, 2024
Good Content
Anonymous
upvote

Manish commented on October 19, 2024
Hi it's a good initiative
Anonymous
upvote

Veronica commented on October 19, 2024
Brain dump questions are new to me...I'm not sure how to respond to this since I only answered a handful of questions
UNITED STATES
upvote

Kamran commented on October 19, 2024
Useful resource
UNITED STATES
upvote

AC commented on October 19, 2024
For a moment no, comment, still moving well
Anonymous
upvote

johnny commented on October 19, 2024
great insight
Anonymous
upvote

Marc commented on October 18, 2024
What the best way to learn terraform?
UNITED STATES
upvote

murad commented on October 18, 2024
Very helpful for certs
JORDAN
upvote

Jack commented on October 18, 2024
are these legit ?
Anonymous
upvote

Juan commented on October 18, 2024
From until what page number is enough to pass the certification?
Anonymous
upvote

Sandeep commented on October 18, 2024
This is very helpful for exam crack
UNITED STATES
upvote

Cheron commented on October 18, 2024
Before all i thank to you for your support. I passed my 2 exams I purchased with full version. I got 90% in one exam and in 2 exam I got 86%.
Anonymous
upvote

LA commented on October 18, 2024
Hi there, I have scheduled my EXAM and will share my experience if these questions are valid or not.
Anonymous
upvote

Mazin commented on October 18, 2024
Good questions
Anonymous
upvote

Test commented on October 18, 2024
Test are these teak answeres?
Anonymous
upvote

anonymous commented on October 17, 2024
can someone tell me if this is real questions
UNITED STATES
upvote