New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 1 Question 13 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 13
Topic #: 1
[All CSSLP Questions]

Which of the following approaches can be used to build a security program?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: C, D

Top-Down Approach is an approach to build a security program.

The initiation, support, and direction come from the top management and work their way through middle management and then to staff

members.

It is treated as the best approach.

This approach ensures that the senior management, who is ultimately responsible for protecting the company assets, is driving the

program.

Bottom-Up Approach is an approach to build a security program.

The lower-end team comes up with a security control or a program without proper management support and direction.

It is less effective and doomed to fail.

Answer A and B are incorrect. No such types of approaches exist


Contribute your Thoughts:

0/2000 characters
Lorrie
4 months ago
Not sure about the Left-Up Approach, sounds sketchy.
upvoted 0 times
...
Antione
4 months ago
I agree, Top-Down is the way to go!
upvoted 0 times
...
Louis
4 months ago
Wait, what’s the Right-Up Approach? Never heard of that!
upvoted 0 times
...
Marta
4 months ago
I think the Bottom-Up Approach is underrated.
upvoted 0 times
...
Felicidad
5 months ago
Definitely the Top-Down Approach is a must!
upvoted 0 times
...
Pok
5 months ago
I feel like the Top-Down Approach is the most common one, but I can't recall if the Left-Up Approach is actually a thing.
upvoted 0 times
...
Taryn
5 months ago
I think the Bottom-Up Approach is also valid, but I need to double-check if it was included in our practice questions.
upvoted 0 times
...
Sherell
5 months ago
I remember studying the Top-Down Approach; it seems like a solid way to start a security program.
upvoted 0 times
...
Marnie
5 months ago
I’m not entirely sure about the Right-Up and Left-Up Approaches. Were those mentioned in the textbook?
upvoted 0 times
...
Kirk
5 months ago
This is a good test of our understanding of the data science project lifecycle. Interviewing stakeholders is a key part of the discovery phase, where you're laying the groundwork for the rest of the project. I'm confident option A is the right answer here.
upvoted 0 times
...
Kimi
5 months ago
I feel like I remember something about the "X-Forwarded-For" header being important for identifying client IPs. That sounds right, but I'm a bit unsure.
upvoted 0 times
...
Lashawnda
5 months ago
I'm feeling pretty confident about this. I think the answer is D - the Server Protect services stopping would trigger that alert.
upvoted 0 times
...
Cheryll
5 months ago
The question is focused on security testing, and the team has an expert in that area. I believe option D, performing exploratory testing sessions with security-focused charters, would be the least important test activity here.
upvoted 0 times
...

Save Cancel