Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CSSLP All Questions

View all questions & answers for the CSSLP exam

Exam CSSLP topic 1 question 67 discussion

Actual exam question from ISC's CSSLP
Question #: 67
Topic #: 1
[All CSSLP Questions]

Which of the following areas of information system, as separated by Information Assurance Framework, is a collection of local computing devices, regardless of physical location, that are interconnected via local area networks (LANs) and governed by a single security policy?

  • A. Local Computing Environments
  • B. Networks and Infrastructures
  • C. Supporting Infrastructures
  • D. Enclave Boundaries
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️
The areas of information system, as separated by Information Assurance Framework, are as follows: Local Computing Environments: This area includes servers, client workstations, operating system, and applications. Enclave Boundaries: This area consists of collection of local computing devices, regardless of physical location, that are interconnected via local area networks (LANs) and governed by a single security policy. Networks and Infrastructures: This area provides the network connectivity between enclaves. It includes operational area networks (OANs), metropolitan area networks (MANs), and campus area networks (CANs). Supporting Infrastructures: This area provides security services for networks, client workstations, Web servers, operating systems, applications, files, and single-use infrastructure machines

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
influence777
7 months, 3 weeks ago
Selected Answer: D
Enclave Boundaries refer to a security domain that is defined by the implementation of a uniform security policy and security posture. These enclaves can encompass local computing devices and are often managed as a single entity, despite the physical location of its components, to ensure cohesive security practices and controls are applied across the board.
upvoted 1 times
...
74gjd_37
1 year, 1 month ago
Selected Answer: A
A. Local Computing Environments refer to a collection of local computing devices, regardless of physical location, that are interconnected via local area networks (LANs) and governed by a single security policy. These environments can include desktop computers, laptops, servers, printers, and other computing devices that are connected to each other through a LAN. Local computing environments are typically managed by a local system administrator and are subject to a set of security policies that are designed to protect the confidentiality, integrity, and availability of the information processed and stored within the environment. Examples of local computing environments include small business networks, home networks, and branch office networks.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...