Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSEP Topic 2 Question 45 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 45
Topic #: 2
[All ISSEP Questions]

Which of the following security controls works as the totality of protection mechanisms within a

computer system, including hardware, firmware, and software, the combination of which is

responsible for enforcing a security policy?

Show Suggested Answer Hide Answer
Suggested Answer: A

Trusted computing base (TCB) refers to hardware, software, controls, and processes that cause a

computer system or network to be devoid of malicious software or hardware. Maintaining the

trusted computing base (TCB) is essential for security policy to be implemented successfully.

Answer option C is incorrect. Internet Protocol Security (IPSec) is a standard-based protocol that

provides the highest level of VPN security. IPSec can encrypt virtually everything above the

networking layer. It is used for VPN connections that use the L2TP protocol. It secures both

data and password. IPSec cannot be used with Point-to-Point Tunneling Protocol (PPTP).

Answer option B is incorrect. The Common data security architecture (CDSA) is a set of layered

security services and cryptographic framework.

It deals with the communications and data security problems in the emerging Internet and intranet

application space. It presents an

infrastructure for building cross-platform, interoperable, security-enabled applications for client-

server environments.

Answer option D is incorrect. An application programming interface (API) is an interface

implemented by a software program which enables it

to interact with other software. It facilitates interaction between different software programs similar

to the way the user interface facilitates

interaction between humans and computers. An API is implemented by applications, libraries, and

operating systems to determine their

vocabularies and calling conventions, and is used to access their services. It may include

specifications for routines, data structures, object

classes, and protocols used to communicate between the consumer and the implementer of the API.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77