Free CSSLP Exam Braindumps

Pass your Certified Information Systems Security Professional exam with these free Questions and Answers

Page 18 of 70
QUESTION 81

"Enhancing the Development Life Cycle to Produce Secure Software" summarizes the tools and practices that are helpful in producing secure software. What are these tools and practices? Each correct answer represents a complete solution. Choose three.

  1. A. Leverage attack patterns
  2. B. Compiler security checking and enforcement
  3. C. Tools to detect memory violations
  4. D. Safe software libraries
  5. E. Code for reuse and maintainability

Correct Answer: BCD
The tools and practices that are helpful in producing secure software are summarized in the report "Enhancing the Development Life Cycle to Produce Secure Software". The tools and practices are as follows: Compiler security checking and enforcement Safe software libraries Runtime error checking and safety enforcement Tools to detect memory violations Code obfuscation Answer A and E are incorrect. These are secure coding principles and practices of defensive coding.

QUESTION 82

The Data and Analysis Center for Software (DACS) specifies three general principles for software assurance which work as a framework in order to categorize various secure design principles. Which of the following principles and practices does the General Principle 1 include? Each correct answer represents a complete solution. Choose two.

  1. A. Principle of separation of privileges, duties, and roles
  2. B. Assume environment data is not trustworthy
  3. C. Simplify the design
  4. D. Principle of least privilege

Correct Answer: AD
General Principle 1- Minimize the number of high-consequence targets includes the following principles and practices:
Principle of least privilege Principle of separation of privileges, duties, and roles Principle of separation of domains Answer B is incorrect. Assume environment data is not trustworthy principle is included in the General Principle 2. Answer B is incorrect. Simplify the design principle is included in the General Principle 3.

QUESTION 83

Which of the following is an example of over-the-air (OTA) provisioning in digital rights management?

  1. A. Use of shared secrets to initiate or rebuild trust.
  2. B. Use of software to meet the deployment goals.
  3. C. Use of concealment to avoid tampering attacks.
  4. D. Use of device properties for unique identification.

Correct Answer: A
Over- the- air provisioning is a mechanism to deploy MIDlet suites over a network. It is a method of distributing MIDlet suites. MIDlet suite providers install their MIDlet suites on Web servers and provide a hypertext link for downloading. A user can use this link to download the MIDlet suite either through the Internet microbrowser or through WAP on his device. Over-the-air provisioning is required for end-to-end encryption or other security purposes in order to deliver copyrighted software to a mobile device. For example, use of shared secrets to initiate or rebuild trust. Answer D and C are incorrect. The use of device properties for unique identification and the use of concealment to avoid tampering attacks are the security challenges in digital rights management (DRM). Answer B is incorrect. The use of software and hardware to meet the deployment goals is a distracter.

QUESTION 84

Which of the following types of obfuscation transformation increases the difficulty for a de- obfuscation tool so that it cannot extract the true application from the obfuscated version?

  1. A. Preventive transformation
  2. B. Data obfuscation
  3. C. Control obfuscation
  4. D. Layout obfuscation

Correct Answer: A
Preventive transformation increases the difficulty for a de-obfuscation tool so that it cannot extract the true application from the obfuscated version.

QUESTION 85

Which of the following processes identifies the threats that can impact the business continuity of operations?

  1. A. Function analysis
  2. B. Risk analysis
  3. C. Business impact analysis
  4. D. Requirement analysis

Correct Answer: C
A business impact analysis (BIA) is a crisis management and business impact analysis technique that identifies those threats that can impact the business continuity of operations. Such threats can be either natural or man-made. The BIA team should have a clear understanding of the organization, key business processes, and IT resources for assessing the risks associated with continuity. In the BIA team, there should be senior management, IT personnel, and end users to identify all resources that are to be used during normal operations. Answer B is incorrect. Risk analysis is the science of risks and their probability and evaluation in a business or a process. It is an important factor in security enhancement and prevention in a system. Risk analysis should be performed as part of the risk management process for each project. The outcome of the risk analysis would be the creation or review of the risk register to identify and quantify risk elements to the project and their potential impact. Answer A is incorrect. The functional analysis process is used for converting system requirements into a comprehensive function standard. Verification is the result of the functional analysis process, in which the fundamentals of a system level functional architecture are defined adequately to allow for synthesis in the design phase. The functional analysis breaks down the higher-level functions into the lower level functions. Answer D is incorrect. Requirements analysis encompasses the tasks that go into determining the needs or conditions to meet for a new or altered product, taking account of the possibly conflicting requirements of the various stakeholders.

Page 18 of 70

Post your Comments and Discuss ISC2 CSSLP exam with other Community members: