Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CSSLP All Questions

View all questions & answers for the CSSLP exam

Exam CSSLP topic 1 question 73 discussion

Actual exam question from ISC's CSSLP
Question #: 73
Topic #: 1
[All CSSLP Questions]

Which of the following is an example of over-the-air (OTA) provisioning in digital rights management?

  • A. Use of shared secrets to initiate or rebuild trust.
  • B. Use of software to meet the deployment goals.
  • C. Use of concealment to avoid tampering attacks.
  • D. Use of device properties for unique identification.
Show Suggested Answer Hide Answer
Suggested Answer: copyrighted software to a mobile device. For example, use of shared secrets to initiate or rebuild trust. Answer: D and C are incorrect. The use of device 🗳️
Over- the- air provisioning is a mechanism to deploy MIDlet suites over a network. It is a method of distributing MIDlet suites. MIDlet suite providers install their MIDlet suites on Web servers and provide a hypertext link for downloading. A user can use this link to download the MIDlet suite either through the
Internet microbrowser or through WAP on his device. Over-the-air provisioning is required for end-to-end encryption or other security purposes in order to deliver properties for unique identification and the use of concealment to avoid tampering attacks are the security challenges in digital rights management (DRM).

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
influence777
7 months, 3 weeks ago
Selected Answer: A
A. Use of shared secrets to initiate or rebuild trust.
upvoted 1 times
...
74gjd_37
1 year, 1 month ago
Selected Answer: B
The correct answer is B. Use of software to meet the deployment goals is an example of over-the-air (OTA) provisioning in digital rights management. This refers to the delivery of digital content or services to devices over a wireless network using software and other security measures to ensure that the content or service is only delivered to authorized devices and users. Option A, use of shared secrets to initiate or rebuild trust, refers to a security mechanism used to establish or reestablish trust between two parties. It is not an example of OTA provisioning in digital rights management. Option C, use of concealment to avoid tampering attacks, refers to a security technique used to protect digital content or services from tampering or modification by unauthorized parties. It is not an example of OTA provisioning in digital rights management. Option D, use of device properties for unique identification, refers to the use of device characteristics to identify and authenticate a device. It is not an example of OTA provisioning in digital rights management.
upvoted 1 times
...
4e3rv21rq3vq2q
2 years, 4 months ago
Selected Answer: A
A. Use of shared secrets to initiate or rebuild trust.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...