Free CSSLP Exam Braindumps (page: 44)

Page 44 of 88

Which of the following is an example of penetration testing?

  1. Implementing NIDS on a network
  2. Implementing HIDS on a computer
  3. Simulating an actual attack on a network
  4. Configuring firewall to block unauthorized traffic

Answer(s): C

Explanation:

Penetration testing is a method of evaluating the security of a computer system or network by simulating an attack from a malicious source, known as a Black Hat Hacker, or Cracker. The process involves an active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker, and can involve active exploitation of security vulnerabilities. Any security issues that are found will be presented to the system owner together with an assessment of their impact and often with a proposal for mitigation or a technical solution. The intent of a penetration testing is to determine feasibility of an attack and the amount of business impact of a successful exploit, if discovered. It is a component of a full security audit.
Answers A, B, and D are incorrect. Implementing NIDS and HIDS and configuring firewall to block unauthorized traffic are not examples of penetration testing.



Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy?

  1. Common data security architecture (CDSA)
  2. Application program interface (API)
  3. Trusted computing base (TCB)
  4. Internet Protocol Security (IPSec)

Answer(s): C

Explanation:

Trusted computing base (TCB) refers to hardware, software, controls, and processes that cause a computer system or network to be devoid of malicious software or hardware. Maintaining the trusted computing base (TCB) is essential for security policy to be implemented successfully. Answer D is incorrect. Internet Protocol Security (IPSec) is a standard-based protocol that provides the highest level of VPN security. IPSec can encrypt virtually everything above the networking layer. It is used for VPN connections that use the L2TP protocol. It secures both data and password. IPSec cannot be used with Point-to-Point Tunneling Protocol (PPTP). Answer A is incorrect. The Common data security architecture (CDSA) is a set of layered security services and cryptographic framework. It deals with the communications and data security problems in the emerging Internet and intranet application space. It presents an infrastructure for building cross-platform, interoperable, security-enabled applications for client-server environments. Answer B is incorrect. An application programming interface (API) is an interface implemented by a software program which enables it to interact with other software. It facilitates interaction between different software programs similar to the way the user interface facilitates interaction between humans and computers. An API is implemented by applications, libraries, and operating systems to determine their vocabularies and calling conventions, and is used to access their services. It may include specifications for routines, data structures, object classes, and protocols used to communicate between the consumer and the implementer of the API.



You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?

  1. Availability
  2. Confidentiality
  3. Non repudiation
  4. Data Protection

Answer(s): C

Explanation:

Non repudiation refers to mechanisms that prevent a party from falsely denying involvement in some data transaction.



Drag and drop the correct DoD Policy Series at their appropriate places.

  1. The Answer is Exhibit B.

Answer(s): A

Explanation:

The various DoD policy series are as follows:



Page 44 of 88



Post your Comments and Discuss ISC2 CSSLP exam with other Community members:

Manish commented on October 19, 2024
Hi it's a good initiative
Anonymous
upvote

Veronica commented on October 19, 2024
Brain dump questions are new to me...I'm not sure how to respond to this since I only answered a handful of questions
UNITED STATES
upvote

Kamran commented on October 19, 2024
Useful resource
UNITED STATES
upvote

AC commented on October 19, 2024
For a moment no, comment, still moving well
Anonymous
upvote

johnny commented on October 19, 2024
great insight
Anonymous
upvote

Marc commented on October 18, 2024
What the best way to learn terraform?
UNITED STATES
upvote

murad commented on October 18, 2024
Very helpful for certs
JORDAN
upvote

Jack commented on October 18, 2024
are these legit ?
Anonymous
upvote

Juan commented on October 18, 2024
From until what page number is enough to pass the certification?
Anonymous
upvote

Sandeep commented on October 18, 2024
This is very helpful for exam crack
UNITED STATES
upvote

Cheron commented on October 18, 2024
Before all i thank to you for your support. I passed my 2 exams I purchased with full version. I got 90% in one exam and in 2 exam I got 86%.
Anonymous
upvote

LA commented on October 18, 2024
Hi there, I have scheduled my EXAM and will share my experience if these questions are valid or not.
Anonymous
upvote

Mazin commented on October 18, 2024
Good questions
Anonymous
upvote

Test commented on October 18, 2024
Test are these teak answeres?
Anonymous
upvote

anonymous commented on October 17, 2024
can someone tell me if this is real questions
UNITED STATES
upvote

Steven commented on October 17, 2024
Questions are spot on and I passed the exam.
UNITED STATES
upvote

Ntombi commented on October 17, 2024
i find the questions helpful for my exam preparation
Anonymous
upvote

Ntombi commented on October 17, 2024
The questions help me to see if I understood what I have learned
Anonymous
upvote

ntombi commented on October 17, 2024
writing exam at the end of the month
Anonymous
upvote

Apvj commented on October 17, 2024
Need to update section 5 questions,it was all new question today in exam , unitl section 4 it was fine even though pattern of question changed
Anonymous
upvote

ghada commented on October 17, 2024
it helps a lot
Anonymous
upvote

John commented on October 17, 2024
Good mock exam
Anonymous
upvote

test commented on October 17, 2024
Good content
UNITED STATES
upvote

Manoo commented on October 17, 2024
Hello guys, I hope everyone is doing good and preparing for this exam. I just wanted to share my experience about my exam. I wrote this exam yesterday and I passed. The key is to focus on each topic and memorize all these questions. You see most of them in your test. Good luck
INDIA
upvote

Ad commented on October 17, 2024
Hi I am new to IT
Anonymous
upvote

sadai commented on October 17, 2024
I really apricate this helpful test thank you so much
Anonymous
upvote

Lee commented on October 17, 2024
This is a very good resource. I'm glad this is provided for free for everyone to pass their exam. I'm sure everyone knows how difficult these exams are.
UNITED STATES
upvote

BANKEY BIHARI LAL commented on October 17, 2024
Very good mock exams as per the actual exam standards.
INDIA
upvote

Faruk commented on October 17, 2024
is free content is enough for pas az-900 ?
Anonymous
upvote

chad johnson commented on October 16, 2024
learning from this test
UNITED STATES
upvote

Keketso commented on October 16, 2024
This is a valuable resource for Az-900, i think
Anonymous
upvote

MP commented on October 16, 2024
Still Preparing Hopefully these are helpful
UNITED STATES
upvote

dado commented on October 16, 2024
cool thanks
BELGIUM
upvote

Harry commented on October 16, 2024
Thanks for the sample exam!
UNITED STATES
upvote