100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CSSLP Domain 2 - Secure Software Requirements Questions and Answers 100% Pass

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
05-06-2024
Written in
2023/2024

CSSLP Domain 2 - Secure Software Requirements Questions and Answers 100% Pass Which of the following MUST be addressed by software security requirements? Choose the BEST answer. A. Technology used in building the application B. Goals and objectives of the organization C. Software quality requirements. D. External auditor requirements - Correct Answer ️️ -B. Goals and objectives of the organization Which of the following types of information is exempt from confidentiality requirements? A. Directory information B. Personally identifiable information (PII) C. User's card holder data D. Software architecture and network diagram - Correct Answer ️️ -A. Directory information Requirements that are identified to protect against the destruction of information or the software itself are commonly referred to as A. confidentiality requirements B. integrity requirements C. availability requirements D. authentication requirements - Correct Answer ️️ -C. availability requirements The amount of time by which business operations need to be restored to service levels as expectd by the business when there is a security breach or disaster is known as A. Maximum Tolerable Downtime (MTD) B. Mean Time Before Failure (MTBF) C. Minimum Security Baselinee (MSB) D. Recovery Time Objective (RTO) - Correct Answer ️️ -D. Recovery Time Objective (RTO) The use of an individual's physical characteristics such as retinal blood patterns and fingertips for validating and verifying the user's identity if referred to as A. biometric authentication B. forms authentication C. digest authentication D. integrated authentication - Correct Answer ️️ -A. biometric authentication Which of the following policies is MOST likely to include the following requirement? "All software processing financial transactions need to use more than one factor to verify the identity of the entity requesting access" A. Authorization B. Authentication C. Auditing D. Availability - Correct Answer ️️ -B. Authentication A means of restricting access to objects based on the identity of subjects and/or groups to which they belong, as mandated by the requested resource owner is the definition of A. Non-discretionary Access Control (NDAC) B. Discretionary Access Control (DAC) C. Mandatory Access Control (MAC) D. Role based Access Control - Correct Answer ️️ -B. Discretionary Access Control (DAC) Requirements which when implemented can help to build a history of events that occurred in the software are known as A. authentication requirements B. archiving requirements C. accountability requirements D. authorization requirements - Correct Answer ️️ -C. accoun

Show more Read less
Institution
CSSLP
Course
CSSLP









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CSSLP
Course
CSSLP

Document information

Uploaded on
June 5, 2024
Number of pages
8
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BrittieDonald Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
426
Member since
2 year
Number of followers
162
Documents
22055
Last sold
16 hours ago
BrittieDonald Study Solutions.

Get Help in Your Due Online and Actual Exams, Assignments with Well Researched and Up-to date Study Materials for Guaranteed Success

3.5

95 reviews

5
43
4
14
3
7
2
5
1
26

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions