Free CSSLP Exam Braindumps

Pass your Certified Information Systems Security Professional exam with these free Questions and Answers

Page 3 of 70
QUESTION 6

Rob is the project manager of the IDLK Project for his company. This project has a budget of $5,600,000 and is expected to last 18 months. Rob has learned that a new law may affect how the project is allowed to proceed - even though the organization has already invested over $750,000 in the project. What risk response is the most appropriate for this instance?

  1. A. Transference
  2. B. Enhance
  3. C. Mitigation
  4. D. Acceptance

Correct Answer: D
At this point all that Rob can likely do is accepting the risk event. Because this is an external risk, there is little that Rob can do other than document the risk and share the new with management and the project stakeholders. If the law is passed then Rob can choose the most appropriate way for the project to continue. Acceptance response is a part of Risk Response planning process. Acceptance response delineates that the project plan will not be changed to deal with the risk. Management may develop a contingency plan if the risk does occur. Acceptance response to a risk event is a strategy that can be used for risks that pose either threats or opportunities. Acceptance response can be of two types: Passive acceptance: It is a strategy in which no plans are made to try or avoid or mitigate the risk. Active acceptance: Such responses include developing contingency reserves to deal with risks, in case they occur. Acceptance is the only response for both threats and opportunities. Answer B is incorrect. Mitigation aims to lower the probability and/or impact of the risk event. Answer B is incorrect. Transference transfers the ownership of the risk event to a third party, usually through a contractual agreement. Answer D is incorrect. Enhance is a risk response that tries to increase the probability and/or impact of the positive risk event.

QUESTION 7

The rights of an author or a corporation to make profit from the creation of their products (such as software, music, etc.) are protected by the Intellectual Property law. Which of the following are the components of the Intellectual Property law? Each correct answer represents a part of the solution. Choose two.

  1. A. Trademark law
  2. B. Industrial Property law
  3. C. Copyright law
  4. D. Patent law

Correct Answer: BC
The Industrial Property law and the Copyright law are the components of the Intellectual Property law.

QUESTION 8

You work as a system engineer for BlueWell Inc. You want to verify that the build meets its
data requirements, and correctly generates each expected display and report. Which of the following tests will help you to perform the above task?

  1. A. Performance test
  2. B. Functional test
  3. C. Reliability test
  4. D. Regression test

Correct Answer: B
The various types of internal tests performed on builds are as follows: Regression tests: It is also known as the verification testing. These tests are developed to confirm that capabilities in earlier builds continue to work correctly in the subsequent builds. Functional test: These tests emphasizes on verifying that the build meets its functional and data requirements and correctly generates each expected display and report. Performance tests: These tests are used to identify the performance thresholds of each build. Reliability tests: These tests are used to identify the reliability thresholds of each build.

QUESTION 9

The DoD 8500 policy series represents the Department's information assurance strategy. Which of the following objectives are defined by the DoD 8500 series? Each correct answer represents a complete solution. Choose all that apply.

  1. A. Defending systems
  2. B. Providing IA Certification and Accreditation
  3. C. Providing command and control and situational awareness
  4. D. Protecting information

Correct Answer: ACD
The various objectives of the DoD 8500 series are as follows: Protecting information Defending systems Providing command and control and situational awareness Making sure that the information assurance is integrated into processes Increasing security awareness throughout the DoD's workforce

QUESTION 10

Which of the following are the goals of risk management? Each correct answer represents a complete solution. Choose three.

  1. A. Identifying the risk
  2. B. Assessing the impact of potential threats
  3. C. Identifying the accused
  4. D. Finding an economic balance between the impact of the risk and the cost of the countermeasure

Correct Answer: ABD
There are three goals of risk management as follows: Identifying the risk Assessing the impact of potential threats Finding an economic balance between the impact of the risk and the cost of the countermeasure Answer B is incorrect. Identifying the accused does not come under the scope of risk management.

Page 3 of 70

Post your Comments and Discuss ISC2 CSSLP exam with other Community members: