Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CSSLP All Questions

View all questions & answers for the CSSLP exam

Exam CSSLP topic 1 question 15 discussion

Actual exam question from ISC's CSSLP
Question #: 15
Topic #: 1
[All CSSLP Questions]

Which of the following types of redundancy prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data?

  • A. Data redundancy
  • B. Hardware redundancy
  • C. Process redundancy
  • D. Application redundancy
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️
Process redundancy permits software to run simultaneously on multiple geographically distributed locations, with voting on results. It prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data.

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
c4310dc
4 months, 2 weeks ago
Selected Answer: C
Process redundancy involves running multiple instances of the same process, often on different systems. This provides protection against an attacker compromising a single machine, as the redundant processes on other systems would still be intact. Data redundancy (option A) primarily protects against data loss or corruption, but doesn't inherently prevent unauthorized software insertion or data alteration on a compromised machine. Hardware redundancy (option B) provides backup hardware components, but doesn't directly address software-based attacks or data alteration. Application redundancy (option D) is similar to process redundancy, but the question specifically mentions process redundancy as an option. Therefore, process redundancy (C) is the best answer, as running redundant processes on separate systems provides protection against an attacker compromising and altering data on a single physical machine.
upvoted 1 times
...
74gjd_37
1 year, 1 month ago
Selected Answer: B
Option B: Hardware Redundancy - should be the answer. The key is the work "physical" in the question. This type of redundancy can prevent attacks on physical machines because even if an attacker gains physical control of a single machine and inserts unauthorized software in it; the redundant system remains unaffected and secure.
upvoted 2 times
74gjd_37
1 year, 1 month ago
The other options, Data redundancy, Process redundancy and Application redundancy are incorrect because they do not specifically prevent attacks in which an attacker can get physical control of a machine. - Data redundancy refers to storing duplicate copies of the same data to ensure that it is always accessible but this does not address security issues arising from physical compromise. - Process redundancy involves having multiple identical processes set up as backups for each other so that if one fails the others can take over; again, this does not provide protection against attacks on physical machines. - Application Redundancy involves running multiple instances of the same application to ensure high availability and scalability. While this could reduce disruption caused by software failures or scheduled maintenance on applications systems it may have little impact on preventing physical breach induced attack vectors .
upvoted 1 times
...
...
4e3rv21rq3vq2q
2 years, 4 months ago
Selected Answer: C
C. Process redundancy
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...