exam questions

Exam CSSLP All Questions

View all questions & answers for the CSSLP exam

Exam CSSLP topic 2 question 60 discussion

Actual exam question from ISC's CSSLP
Question #: 60
Topic #: 2
[All CSSLP Questions]

Which of the following statements are true about declarative security? Each correct answer represents a complete solution. Choose all that apply.

  • A. It is employed in a layer that relies outside of the software code or uses attributes of the code.
  • B. It applies the security policies on the software applications at their runtime.
  • C. In this security, authentication decisions are made based on the business logic.
  • D. In this security, the security decisions are based on explicit statements.
Show Suggested Answer Hide Answer
Suggested Answer: of the software code or uses attributes of the code. Answer: C is incorrect. In declarative security, authentication decisions are coarse-grained in nature from an 🗳️
Declarative security applies the security policies on the software applications at their runtime. In this type of security, the security decisions are based on explicit statements that confine security behavior. Declarative security applies security permissions that are required for the software application to access the local resources and provides role-based access control to an individual software component and software application. It is employed in a layer that relies outside operational or external security perspective.
Community vote distribution
AB (100%)

Comments

Chosen Answer:
This is a voting comment. You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
74gjd_37
5 months, 2 weeks ago
Selected Answer: AB
The following statements that are true about declarative security are: A. It is employed in a layer that relies outside of the software code or uses attributes of the code. B. It applies the security policies on the software applications at their runtime. Therefore, options A and B are correct answers. Option C is incorrect because authentication decisions based on business logic describe Context-Dependent Access Control (CDAC). Option D is incorrect because Declarative Security states policy requirements without specifying how to accomplish them, which means they provide no specific rules for implementing enforcement mechanisms.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
PL-600
Los Angeles, 1 minute ago