PrepAway - Latest Free Exam Questions & Answers

Category: CSSLP

Exam CSSLP: Certified Secure Software Lifecycle Professional

What risk response is the most appropriate for this instance?

Rob is the project manager of the IDLK Project for his company. This project has a budget of
$5,600,000 and is expected to last 18 months. Rob has learned that a new law may affect how the
project is allowed to proceed – even though the organization has already invested over $750,000
in the project. What risk response is the most appropriate for this instance?

What is he suggesting this as a countermeasure against?

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to
attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP
printing capability from the server. He is suggesting this as a countermeasure against
__________.

Which of the following is violated in a shoulder surfing attack?

Shoulder surfing is a type of in-person attack in which the attacker gathers information about the
premises of an organization. This attack is often performed by looking surreptitiously at the
keyboard of an employee’s computer while he is typing in his password at any access point such
as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?


Page 21 of 34« First...10...1920212223...30...Last »