New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 1 Question 72 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 72
Topic #: 1
[All CSSLP Questions]

The Web resource collection is a security constraint element summarized in the Java Servlet Specification v2.4. Which of the following elements does it include?

Each correct answer represents a complete solution. Choose two.

Show Suggested Answer Hide Answer
Suggested Answer: B

Configuration auditing is a component of configuration management, which involves periodic checks to establish the consistency and

completeness of accounting information and to confirm that all configuration management policies are being followed. Configuration audits are

broken into functional and physical configuration audits. They occur either at delivery or at the moment of effecting the change. A functional

configuration audit ensures that functional and performance attributes of a configuration item are achieved, while a physical configuration

audit ensures that a configuration item is installed in accordance with the requirements of its detailed design documentation.

Answer D is incorrect. The configuration status accounting procedure is the ability to record and report on the configuration baselines

associated with each configuration item at any moment of time. It supports the functional and physical attributes of software at various points

in time, and performs systematic control of accounting to the identified attributes for the purpose of maintaining software integrity and

traceability throughout the software development life cycle.

Answer C is incorrect. Configuration control is a procedure of the Configuration management. Configuration control is a set of

processes and approval stages required to change a configuration item's attributes and to re-baseline them. It supports the change of the

functional and physical attributes of software at various points in time, and performs systematic control of changes to the identified attributes.

Answer A is incorrect. Configuration identification is the process of identifying the attributes that define every aspect of a configuration

item. A configuration item is a product (hardware and/or software) that has an end-user purpose. These attributes are recorded in

configuration documentation and baselined. Baselining an attribute forces formal configuration change control processes to be effected in the

event that these attributes are changed.


Contribute your Thoughts:

0/2000 characters
Ressie
3 months ago
Not sure about that, sounds too broad to me.
upvoted 0 times
...
Lazaro
3 months ago
Yup, HTTP methods are a must-have!
upvoted 0 times
...
Barrie
3 months ago
Wait, are transport guarantees really in there?
upvoted 0 times
...
Kenny
4 months ago
I think role names are also part of it.
upvoted 0 times
...
Gilma
4 months ago
Definitely includes URL patterns!
upvoted 0 times
...
Omer
4 months ago
I'm leaning towards HTTP methods and URL patterns, but I need to double-check my notes on this.
upvoted 0 times
...
Martina
4 months ago
I feel like transport guarantees could be related, but I can't recall if it's specifically part of the Web resource collection.
upvoted 0 times
...
Annmarie
4 months ago
I remember practicing a similar question, and I think role names might be one of the correct answers.
upvoted 0 times
...
Lauran
5 months ago
I think the Web resource collection includes URL patterns, but I'm not sure about the second option.
upvoted 0 times
...
Huey
5 months ago
The key is to focus on the core responsibilities of a SIP Proxy Server. I think "helps to centralize the administration and call control" and "handles box-to-box redundancy" are the two best answers here.
upvoted 0 times
...
Marg
5 months ago
Okay, I know the subnet mask has 4 octets, and each octet represents 8 bits. So I just need to convert 255.255.240.0 to binary.
upvoted 0 times
...
Norah
10 months ago
D and B, easy peasy! Although, I did consider C for a second there. Transport guarantees? In a web resource collection? *laughs* Nah, just kidding.
upvoted 0 times
Lindsey
8 months ago
I almost picked C as well, but then I remembered it's not relevant to the Web resource collection. Good job on getting the right answers!
upvoted 0 times
...
Delmy
8 months ago
Yeah, transport guarantees seem out of place in that context. Good thing we both got it right.
upvoted 0 times
...
Jacqueline
8 months ago
I chose D and B too. Role names and URL patterns are definitely part of the Web resource collection.
upvoted 0 times
...
...
Nydia
10 months ago
This is a classic case of 'D for URL patterns and B for role names'. Nailed it! Or at least, I hope I did. *chuckles*
upvoted 0 times
...
Mel
10 months ago
Hmm, let's see... D and B make the most sense here. I'm not sure the other options are even relevant to the web resource collection. *scratches head*
upvoted 0 times
Sabina
8 months ago
Yeah, Transport guarantees and URL patterns don't seem to fit in this context.
upvoted 0 times
...
Hui
8 months ago
HTTP methods and Role names are definitely important for security constraints.
upvoted 0 times
...
Pamella
9 months ago
I agree, D and B are the correct elements for the Web resource collection.
upvoted 0 times
...
...
Rex
10 months ago
I was a bit confused by this one, but I think D and B are the way to go. Can't go wrong with URL patterns and role names, right?
upvoted 0 times
Lezlie
9 months ago
That's correct. URL patterns and role names are essential elements in defining security constraints in Java Servlet Specification.
upvoted 0 times
...
Novella
9 months ago
Yes, you're right. HTTP methods and transport guarantees are not included in the Web resource collection security constraint element.
upvoted 0 times
...
Galen
9 months ago
I agree, D and B are the correct choices. URL patterns and role names are definitely part of the Web resource collection security constraint element.
upvoted 0 times
...
...
Isabella
10 months ago
D and B look like the right answers to me. The web resource collection is all about URL patterns and role names, not HTTP methods or transport guarantees.
upvoted 0 times
Una
10 months ago
Yes, the web resource collection focuses on URL patterns and role names.
upvoted 0 times
...
Una
10 months ago
I agree, D and B are the correct answers.
upvoted 0 times
...
...
Lavonna
11 months ago
I'm not sure about the other options, but HTTP methods and URL patterns make sense for security constraints.
upvoted 0 times
...
Roosevelt
11 months ago
I agree with Carin. HTTP methods and URL patterns are definitely part of the security constraint element.
upvoted 0 times
...
Carin
11 months ago
I think the Web resource collection includes HTTP methods and URL patterns.
upvoted 0 times
...

Save Cancel