exam questions

Exam CSSLP All Questions

View all questions & answers for the CSSLP exam

Exam CSSLP topic 2 question 78 discussion

Actual exam question from ISC's CSSLP
Question #: 78
Topic #: 2
[All CSSLP Questions]

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy?

  • A. Common data security architecture (CDSA)
  • B. Application program interface (API)
  • C. Trusted computing base (TCB)
  • D. Internet Protocol Security (IPSec)
Show Suggested Answer Hide Answer
Suggested Answer: malicious software or hardware. Maintaining the trusted computing base (TCB) is essential for security policy to be implemented successfully. Answer: D is 🗳️
Trusted computing base (TCB) refers to hardware, software, controls, and processes that cause a computer system or network to be devoid of incorrect. Internet Protocol Security (IPSec) is a standard-based protocol that provides the highest level of VPN security. IPSec can encrypt virtually everything above the networking layer. It is used for VPN connections that use the L2TP protocol. It secures both data and password. IPSec cannot be used with Point-to- framework. It deals with the communications and data security problems in the emerging Internet and intranet application space. It presents an infrastructure for
(API) is an interface implemented by a software program which enables it to interact with other software. It facilitates interaction between different software programs similar to the way the user interface facilitates interaction between humans and computers. An API is implemented by applications, libraries, and operating systems to determine their vocabularies and calling conventions, and is used to access their services. It may include specifications for routines, data structures, object classes, and protocols used to communicate between the consumer and the implementer of the API.

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
74gjd_37
5 months, 2 weeks ago
Selected Answer: C
C. Trusted computing base (TCB) The Trusted Computing Base (TCB) is a security control that refers to the totality of protection mechanisms within a computer system. The TCB comprises hardware components, firmware, and software that enforce basic security features such as access controls, data confidentiality/integrity and availability.
upvoted 1 times
74gjd_37
5 months, 2 weeks ago
The Common Data Security Architecture (CDSA) provides developers with standardized application programming interfaces(APIs) and services for cryptographic functions like encryption/decryption or digital signature technologies in distributed environments rather than providing total coverage for enforcement. Internet Protocol Security(IPSec), on the other hand, is a network layer protocol suite used in creating secure communication over Internet Protocol-based networks via authenticating and encrypting information sent over IP packets. Although APIs play an essential role in facilitating specific interactions between different software systems at various layers in complex architectures from a development standpoint—such as interfacing third-party software solutions via API integrations—they are not comprehensive protection solutions encompassing everything necessary for enforcing security features holistically within one system federally by themselves.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago