Search Header Logo

CSSLP-1

Authored by dd disuza

English

1st Grade

Used 1+ times

CSSLP-1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a name, symbol, or slogan with which a product is identified?

A. Trademark

B. Copyright

C. Trade secret

D. Patent

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security design principles supports comprehensive and simple design and implementation of protection mechanisms, so that an unintended access path does not exist or can be readily identified and eliminated?

A. Least privilege

B. Economy of mechanism

C. Psychological acceptability

D. Separation of duties

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are the benefits of information classification for an organization? Each correct answer represents a complete solution. Choose two.

A. It helps reduce the Total Cost of Ownership (TCO).

B. It helps identify which protections apply to which information.

C. It helps identify which information is the most sensitive or vital to an organization.

D. It ensures that modifications are not made to data by unauthorized personnel or processes

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

A. Integrity

B. Availability

C. Non-repudiation

D. Confidentiality

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

  • A. Authentication

  • B. Integrity

  • C. Non-repudiation

  • D. Confidentiality

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following individuals inspects whether the security policies, standards, guidelines, and procedures are efficiently performed in accordance with the company's stated security objectives?

  • A. Information system security professional

  • B. Data owner

  • r

  • C. Senior management

  • D. Information system auditor

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security design patterns provides an alternative by requiring that a user's authentication credentials be verified by the database before providing access to that user's data?

  • A. Secure assertion

  • B. Authenticated session

  • C. Password propagation

  • D. Account lockout

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?