100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CSSLP Domain 3 - Secure Software Design Questions with Accurate Answers

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
26-10-2025
Written in
2025/2026

A Man-in-the-Middle (MITM) attack is PRIMARILY an expression of which type of the following threats? A. Spoofing B. Tampering C. Repudiation D. Information disclosure correct answer A. Spoofing At which layer of the Open Systems Interconnect (OSI) model must security controls be designed to effectively mitigate side channel attacks? A. Transport B. Network C. Data link D. Physical correct answer D. Physical Certificate Authority, Registration Authority, and Certificate Revocation Lists are all part of which of the following? A. Advanced Encryption Standard (AES) B. Steganography C. Public Key Infrastructure (PKI) D. Lightweight Directory Access Protocol (LDAP) correct answer C. Public Key Infrastructure (PKI)

Show more Read less
Institution
Crim/law
Course
Crim/law









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Crim/law
Course
Crim/law

Document information

Uploaded on
October 26, 2025
Number of pages
8
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CSSLP Domain 3 - Secure
Software Design Questions with
Accurate Answers
A Man-in-the-Middle (MITM) attack is PRIMARILY an expression of which type of
the following threats?
A. Spoofing
B. Tampering
C. Repudiation
D. Information disclosure correct answer A. Spoofing


At which layer of the Open Systems Interconnect (OSI) model must security
controls be designed to effectively mitigate side channel attacks?
A. Transport
B. Network
C. Data link
D. Physical correct answer D. Physical


Certificate Authority, Registration Authority, and Certificate Revocation Lists are
all part of which of the following?
A. Advanced Encryption Standard (AES)
B. Steganography
C. Public Key Infrastructure (PKI)
D. Lightweight Directory Access Protocol (LDAP) correct answer C. Public Key
Infrastructure (PKI)

, Choose the BEST answer. Configurable settings for logging exceptions, auditing
and credential management must be part of
A. database views
B. security management interfaces
C. global files
D. exception handling correct answer B. security management interfaces


Database triggers are PRIMARILY useful for providing which of the following
detective software assurance capability?
A. Availability
B. Authorization
C. Auditing
D. Archiving correct answer C. Auditing


During a threat modeling exercise, the software architecture is reviewed to
identify
A. attackers
B. business impact
C. critical assets
D. entry points correct answer D. entry points


During which phase of the software development lifecycle (SDLC) is threat
modeling initiated?
A. Requirements analysis
B. Design
C. Implementation

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
starwid Yale University
View profile
Follow You need to be logged in order to follow users or courses
Sold
13
Member since
7 months
Number of followers
1
Documents
8559
Last sold
4 weeks ago

3.3

4 reviews

5
1
4
0
3
2
2
1
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions