CSSLP Sample Exam (2024) Questions and Answers 100% Pass
CSSLP Sample Exam (2024) Questions and Answers 100% Pass QUESTION 1 An organization has signed a contract to build a large Information System (IS) for the United States government. Which framework, guideline, or standard would BEST meet government information processing requirements? A. Control Objectives for Information and Related Technology (COBIT) B. Information Technology Infrastructure Library (ITIL) C. National Institute of Standards and Technology (NIST) D. International Organization for Standardization (ISO) 27000 - Correct Answer ️️ - Correct Answer: C Explanation/Reference: NIST Special Publication 800-171 is rapidly emerging as the benchmark used by the civilian US government and Department of Defense for evaluating the security and privacy posture of nonfederal organizations that seek to contract with the US government. QUESTION 2 An organization deploys an Internet web application. A security researcher sends an e- mail to a mailing list stating that the web application is susceptible to Cross-Site Scripting (XSS) What type of testing could BEST discover this type of vulnerability? A. Simulation testing B. Automated regression testing C. Fuzz testing D. Integration testing - Correct Answer ️️ -Correct Answer: C Explanation/Reference: Intellifuzz is a Python script designed to not only determine if a cross-site scripting attack is possible, but also determine the exact payload needed to cleanly break out of the code. Many web scanners and fuzzers operate by using a long list of possible payloads and recording the response to see if the payload is reflected. However, just because a payload is reflected does not mean it will execute. For example, if the payload is reflected as an HTML attribute, a carefully crafted string must be created to first break out of the attribute using quotes, then potentially break out of the tag, then finally launch the script. Intellifuzz aims to take care of crafting the payload for you by first detecting the location of the parameter reflection, then using a number of tests to determine what characters are needed to cause a successful execution. QUESTION 3 Which of the following mitigates cryptographic keys from being stoles by cold-boot attacks? A. Use symmetric keys instead of asymmetric keys B. Overwrite the keys in memory once they are no longer needed C. Use passwords to derive the cryptographic keys D. Combine cryptographic keys with random salt values - Correct Answer ️️ -Correct Answer: B Explanation/Reference: After a computer is powered off, the data in RAM disappears rapidly, but it can remain in RAM up to several minutes after shutdown. An attacker having access to a computer before it disappears completely could recover important data from your session. This can be achieved using a technique called cold boot attack . To prevent this attack, the data in RAM is overwritten by random data when shutting down. This erases all traces from your session on that computer. QUESTION 4 A strong application architecture that provides separation and security between components is essential for preventing which of the following? A. Security misconfiguration B. Cross-Site Scripting (XSS) attacks C. Tampering with source code modules D. Security breaches due to weak cryptographic algorithms - Correct Answer ️️ - Correct Answer: A Explanation/Reference: Security misconfiguration can happen at any level of an application stack, including the platform, web server, application server, database, framework, and custom code. Developers and system administrators need to work together to ensure that the entire stack is configured properly. Automated scanners are useful for detecting missing patches, misconfigurations, use of default accounts, unnecessary services, etc. QUESTION 5 Which of the following is MOST likely to require controls over both the location of data and the location of the user? A. Confidentiality B. Availability C. Integrity D. Privacy - Correct Answer ️️ -Correct Answer: D Explanation/Reference: The Location Data Privacy, Assessment and Guidelines (hereinafter Guidelines) were developed for those on the front lines of location data product and services development, as well as those who hold corporate, legal or fiduciary responsibilities. They bring attention to issues that many organizations and companies have chosen to ignore, due to lack of legal certainty around requirements, and provides a framework of location data practices for developers, managers, marketers, and executives. Location- based services and applications have become more than a technology or feature; they are an integral part of our lives. People define themselves not just by who they are, but where they are. Location data is now everywhere, easily accessible, and collected at an unprecedented scale. In the Information Economy we live in, personal data and similar forms of information are the new currencies. Location data is the universal link between all data, because everything and everyone is somewhere. For businesses, location information can transform virtually every facet of an enterprise from operations to sales and marketing, to customer care and even product development - all with a goal of having a positive impact on the bottom line. It is therefore rapidly becoming the newest "information weapon" used by CIOs, CMOs, COOs and digital strategists to gain a competitive advantage. The problem with location data today is that it changes as it weaves through various hands—applications, vendors, developers, government, companies, data providers, and individual users. Another complication is the diversity of legal protections across countries and states that make developing a consistent privacy policy a moving target. All this is set against a business atmosphere of continuous pressure to devel QUESTION 6 What is the BEST step to take in order to minimize risk when introducing a critical vendor security patch into the production environment? A. Ask the developer to test the patch in the development environment first B. Gain management support for installation directly into production since the patch is critical C. Follow the change management process for critical patches D. Contact he system administrator and request immediate installation production - Correct Answer ️️ -Correct Answer: C Explanation/Reference: Test all patches before deploying them. Patches should be tested in the testing, and not development environment, before being deployed to the production environment. QUESTION 7 Which of the following is the FIRST step a software tester would perfor
Geschreven voor
- Instelling
- CSSLP
- Vak
- CSSLP
Documentinformatie
- Geüpload op
- 5 juni 2024
- Aantal pagina's
- 198
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
csslp sample exam 2024 questions and answers 100
Ook beschikbaar in voordeelbundel