Certified Secure Software Lifecycle Professional (CSSLP) Quiz Questions and Answers

Which of the following is a name, symbol, or slogan with which a product is identified?

Answer :
  • Trademark

The resiliency of software to withstand attacks that attempt to modify or alter data in an unauthorized manner is referred to as________.

Answer :
  • Integrity.

Multi-factor authentication is most closely related to which of the following security design principles?

Answer :
  • Defense in depth

Audit logs can be used for all of the following except______.

Answer :
  • preventing a user from performing some unauthorized operations

An instrument that is used to communicate and mandate organizational and management goals and objectives at a high level is a________.

Answer :
  • policy

Requirements that are identified to protect against the destruction of information or the software itself are commonly referred to as________.

Answer :
  • availability requirements

The amount of time by which business operations need to be restored to service levels as expected by the business when there is a security breach or disaster is known as______.

Answer :
  • Recovery Time Objective (RTO).

The use of an individual’s physical characteristics, such as retinal blood patterns and fingerprints, for validating and verifying the user’s identity is referred to as_______.

Answer :
  • biometric authentication

Requirements that, when implemented, can help to build a history of events that occurred in the software are known as________.

Answer :
  • accountability requirements

The first step in the Protection Needs Elicitation (PNE) process is to________.

Answer :
  • engage the customer