Free CSSLP Exam Braindumps (page: 17)

Page 17 of 88

You work as a Security Manager for Tech Perfect Inc. In the organization, Syslog is used for computer system management and security auditing, as well as for generalized informational, analysis, and debugging messages. You want to prevent a denial of service (DoS) for the Syslog server and the loss of Syslog messages from other sources. What will you do to accomplish the task?

  1. Use a different message format other than Syslog in order to accept data.
  2. Enable the storage of log entries in both traditional Syslog files and a database.
  3. Limit the number of Syslog messages or TCP connections from a specific source for a certain time period.
  4. Encrypt rotated log files automatically using third-party or OS mechanisms.

Answer(s): C

Explanation:

In order to accomplish the task, you should limit the number of Syslog messages or TCP connections from a specific source for a certain time period. This will prevent a denial of service (DoS) for the Syslog server and the loss of Syslog messages from other sources. Answer D is incorrect. You can encrypt rotated log files automatically using third-party or OS mechanisms to protect data confidentiality. Answer A is incorrect. You can use a different message format other than Syslog in order to accept data for aggregating data from hosts that do not support Syslog. Answer B is incorrect. You can enable the storage of log entries in both traditional Syslog files and a database for creating a database storage for logs.



You work as a project manager for a company. The company has started a new security software project. The software configuration management will be used throughout the lifecycle of the project. You are tasked to modify the functional features and the basic logic of the software and then make them compatible to the initial design of the project. Which of the following procedures of the configuration management will you follow to accomplish the task?

  1. Configuration status accounting
  2. Configuration control
  3. Configuration audits
  4. Configuration identification

Answer(s): B

Explanation:

Configuration control is a procedure of the Configuration management. Configuration control is a set of processes and approval stages required to change a configuration item's attributes and to re-baseline them. It supports the change of the functional and physical attributes of software at various points in time, and performs systematic control of changes to the identified attributes. Answer C is incorrect. Configuration audits confirm that the configuration identification for a configured item is accurate, complete, and will meet specified program needs. Configuration audits are broken into functional and physical configuration audits. They occur either at delivery or at the moment of effecting the change. A functional configuration audit ensures that functional and performance attributes of a configuration item are achieved, while a physical configuration audit ensures that a configuration item is installed in accordance with the requirements of its detailed design documentation. Answer D is incorrect. Configuration identification is the process of identifying the attributes that define every aspect of a configuration item. A configuration item is a product (hardware and/or software) that has an end-user purpose. These attributes are recorded in configuration documentation and baselined. Baselining an attribute forces formal configuration change control processes to be effected in the event that these attributes are changed. Answer A is incorrect. The configuration status accounting procedure is the ability to record and report on the configuration baselines associated with each configuration item at any moment of time. It supports the functional and physical attributes of software at various points in time, and performs systematic control of accounting to the identified attributes for the purpose of maintaining software integrity and traceability throughout the software development life cycle.



Which of the following areas of information system, as separated by Information Assurance Framework, is a collection of local computing devices, regardless of physical location, that are interconnected via local area networks (LANs) and governed by a single security policy?

  1. Local Computing Environments
  2. Networks and Infrastructures
  3. Supporting Infrastructures
  4. Enclave Boundaries

Answer(s): D

Explanation:

The areas of information system, as separated by Information Assurance Framework, are as follows: Local Computing Environments: This area includes servers, client workstations, operating system, and applications. Enclave Boundaries: This area consists of collection of local computing devices, regardless of physical location, that are interconnected via local area networks (LANs) and governed by a single security policy. Networks and Infrastructures: This area provides the network connectivity between enclaves. It includes operational area networks (OANs), metropolitan area networks (MANs), and campus area networks (CANs). Supporting Infrastructures: This area provides security services for networks, client workstations, Web servers, operating systems, applications, files, and single-use infrastructure machines



Which of the following is a signature-based intrusion detection system (IDS) ?

  1. RealSecure
  2. StealthWatch
  3. Tripwire
  4. Snort

Answer(s): D

Explanation:

Snort is a signature-based intrusion detection system. Snort is an open source network intrusion prevention and detection system that operates as a network sniffer. It logs activities of the network that is matched with the predefined signatures. Signatures can be designed for a wide range of traffic, including Internet Protocol (IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP). The three main modes in which Snort can be configured are as follows: Sniffer mode: It reads the packets of the network and displays them in a continuous stream on the console. Packet logger mode: It logs the packets to the disk. Network intrusion detection mode: It is the most complex and configurable configuration, allowing Snort to analyze network traffic for matches against a user-defined rule set. Answer B is incorrect. StealthWatch is a behavior-based intrusion detection system. Answer A is incorrect. RealSecure is a network-based IDS that monitors TCP, UDP and ICMP traffic and is configured to look for attack patterns. Answer C is incorrect. Tripwire is a file integrity checker for UNIX/Linux that can be used for host-based intrusion detection.



Page 17 of 88



Post your Comments and Discuss ISC2 CSSLP exam with other Community members:

John commented on October 17, 2024
Good mock exam
Anonymous
upvote

test commented on October 17, 2024
Good content
UNITED STATES
upvote

Manoo commented on October 17, 2024
Hello guys, I hope everyone is doing good and preparing for this exam. I just wanted to share my experience about my exam. I wrote this exam yesterday and I passed. The key is to focus on each topic and memorize all these questions. You see most of them in your test. Good luck
INDIA
upvote

Ad commented on October 17, 2024
Hi I am new to IT
Anonymous
upvote

sadai commented on October 17, 2024
I really apricate this helpful test thank you so much
Anonymous
upvote

Lee commented on October 17, 2024
This is a very good resource. I'm glad this is provided for free for everyone to pass their exam. I'm sure everyone knows how difficult these exams are.
UNITED STATES
upvote

BANKEY BIHARI LAL commented on October 17, 2024
Very good mock exams as per the actual exam standards.
INDIA
upvote

Faruk commented on October 17, 2024
is free content is enough for pas az-900 ?
Anonymous
upvote

chad johnson commented on October 16, 2024
learning from this test
UNITED STATES
upvote

Keketso commented on October 16, 2024
This is a valuable resource for Az-900, i think
Anonymous
upvote

MP commented on October 16, 2024
Still Preparing Hopefully these are helpful
UNITED STATES
upvote

dado commented on October 16, 2024
cool thanks
BELGIUM
upvote

Harry commented on October 16, 2024
Thanks for the sample exam!
UNITED STATES
upvote

Rajesh K commented on October 16, 2024
fantastic contents provided by free braindumps, it is improving my accuracy.
Anonymous
upvote

chris commented on October 16, 2024
this dumps is very helpfull
Anonymous
upvote

Kiran commented on October 16, 2024
These are related questions
UNITED STATES
upvote

raj singh commented on October 16, 2024
This is a good resource for az-900, go for it.
INDIA
upvote

Gobenathan commented on October 16, 2024
This is a good exam done but the free version is not complete the PDF version has all the question. that is what I used to pass my exam.
INDIA
upvote

Girish commented on October 16, 2024
Question are nice
Anonymous
upvote

SS commented on October 16, 2024
Nice Interface
UNITED STATES
upvote

Mohit commented on October 16, 2024
Passed this exam on second try with the help of this exam dumps. Very close to real exam.
India
upvote

XyRome commented on October 15, 2024
Where is the next set?
FRANCE
upvote

ano commented on October 15, 2024
Nice one help me lot
Anonymous
upvote

Draksh commented on October 15, 2024
Good content
UNITED STATES
upvote

Kumar commented on October 15, 2024
I can confirm this is legit and valid in UK. Passed the exam today. Good work.
UNITED STATES
upvote

Ank commented on October 15, 2024
good questions
Anonymous
upvote

Ankita commented on October 15, 2024
Nice questions
Anonymous
upvote

Ankita commented on October 15, 2024
Interesting questions
Anonymous
upvote

Laks commented on October 15, 2024
If you need to pass in first try you must use this exam dump. I passed on the first go.
Anonymous
upvote

Lakshmy S commented on October 15, 2024
question 3 the correct answer is EDISCOVERY and not customer lockbox
Anonymous
upvote

Ss commented on October 15, 2024
Did someone pass the exam with the questions from the dump? Are they valid?
UNITED STATES
upvote

Ashutosh commented on October 15, 2024
Its really good to have all informative data. Thanks !
Anonymous
upvote

Ram commented on October 15, 2024
Good material
Anonymous
upvote

karishma commented on October 15, 2024
is this right answer or wrong
UNITED KINGDOM
upvote