New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 1 Question 77 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 77
Topic #: 1
[All CSSLP Questions]

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

Show Suggested Answer Hide Answer
Suggested Answer: C

The DAA, also known as Authorizing Official, makes the final accreditation decision. The Designated Approving Authority (DAA), in the United

States Department of Defense, is the official with the authority to formally assume responsibility for operating a system at an acceptable level

of risk. The DAA is responsible for implementing system security. The DAA can grant the accreditation and can determine that the system's

risks are not at an acceptable level and the system is not ready to be operational.

Answer D is incorrect. An Information System Security Officer (ISSO) plays the role of a supporter. The responsibilities of an Information

System Security Officer (ISSO) are as follows:

Manages the security of the information system that is slated for Certification & Accreditation (C&A).

Insures the information systems configuration with the agency's information security policy.

Supports the information system owner/information owner for the completion of security-related responsibilities.

Takes part in the formal configuration management process.

Prepares Certification & Accreditation (C&A) packages.

Answer A is incorrect. An Information System Security Engineer (ISSE) plays the role of an advisor. The responsibilities of an

Information System Security Engineer are as follows:

Provides view on the continuous monitoring of the information system.

Provides advice on the impacts of system changes.

Takes part in the configuration management process.

Takes part in the development activities that are required to implement system changes.

Follows approved system changes.

Answer B is incorrect. A Chief Risk Officer (CRO) is also known as Chief Risk Management Officer (CRMO). The Chief Risk Officer or Chief

Risk Management Officer of a corporation is the executive accountable for enabling the efficient and effective governance of significant risks,

and related opportunities, to a business and its various segments. Risks are commonly categorized as strategic, reputational, operational,

financial, or compliance-related. CRO's are accountable to the Executive Committee and The Board for enabling the business to balance risk

and reward. In more complex organizations, they are generally responsible for coordinating the organization's Enterprise Risk Management

(ERM) approach.


Contribute your Thoughts:

0/2000 characters
Novella
3 months ago
I thought anonymous was a thing too, but this makes sense!
upvoted 0 times
...
Laura
3 months ago
Biometrics would be something else entirely.
upvoted 0 times
...
Sharita
3 months ago
Wait, are we sure it's not mutual?
upvoted 0 times
...
Samira
4 months ago
Agreed, smart cards + passwords = multi-factor.
upvoted 0 times
...
Dong
4 months ago
It's definitely multi-factor authentication!
upvoted 0 times
...
Lynda
4 months ago
Biometrics seems like it could fit, but I don't recall it involving smart cards. I lean towards multi-factor too.
upvoted 0 times
...
Phung
4 months ago
This question feels familiar; I practiced one like it, and I think multi-factor is the right answer because it adds layers of security.
upvoted 0 times
...
Rueben
4 months ago
I'm not entirely sure, but I remember something about mutual authentication involving both parties verifying each other.
upvoted 0 times
...
Denae
5 months ago
I think this might be multi-factor authentication since it combines something you have (the smart card) with something you know (username and password).
upvoted 0 times
...
Rolande
5 months ago
Alright, I've got this. The key is the combination of smart cards and usernames/passwords. That's clearly multi-factor authentication. I'll mark that answer and move on.
upvoted 0 times
...
Bobbye
5 months ago
Ugh, I'm a bit confused on this one. The question mentions smart cards, but I'm not sure how that fits into the authentication methods listed. I'll have to re-read it carefully and try to eliminate the options that don't make sense.
upvoted 0 times
...
Ling
5 months ago
Ah, this is a classic multi-factor authentication scenario. The smart cards and usernames/passwords give it away. I'm confident I can nail this one.
upvoted 0 times
...
Christene
5 months ago
Okay, let me think this through. Smart cards and usernames/passwords... I'm guessing this is some kind of multi-factor authentication, but I'm not 100% sure. I'll have to carefully consider the options.
upvoted 0 times
...
Lauran
5 months ago
Hmm, this one seems straightforward. The question mentions smart cards and usernames/passwords, so I'm pretty sure the answer is multi-factor authentication.
upvoted 0 times
...
Rupert
5 months ago
I'm not sure about this one. The question doesn't provide much detail on how the rules work. I'll have to guess.
upvoted 0 times
...
Karma
5 months ago
Ugh, I can never remember the specifics of HTTP headers. Let me try to reason this through step-by-step.
upvoted 0 times
...
Richelle
5 months ago
Hmm, I'm a bit confused. Is it about referencing the image digest in the source control tag, or using GCR digest versioning? I'll need to think this through carefully.
upvoted 0 times
...
Elli
9 months ago
Ooh, smart cards! This is like something out of a spy movie. Multi-factor is the answer, for sure.
upvoted 0 times
Michael
8 months ago
Biometrics can also be a strong authentication method.
upvoted 0 times
...
Marsha
8 months ago
Smart cards definitely add an extra level of protection.
upvoted 0 times
...
Wilbert
8 months ago
I think it's important to have multiple layers of security.
upvoted 0 times
...
Adell
9 months ago
I agree, multi-factor authentication is very secure.
upvoted 0 times
...
...
Tommy
10 months ago
Mutual authentication? Nah, that's not it. This is all about making sure I'm who I say I am, not the other way around.
upvoted 0 times
...
Alonso
10 months ago
Haha, I almost went with biometrics because who doesn't love a good fingerprint scan? But multi-factor is the way to go here.
upvoted 0 times
Fausto
9 months ago
Smart choice going with multi-factor authentication over biometrics.
upvoted 0 times
...
Detra
9 months ago
Biometrics are cool, but having multiple layers of authentication is key.
upvoted 0 times
...
Izetta
9 months ago
I agree, multi-factor authentication is definitely more secure.
upvoted 0 times
...
...
Reita
10 months ago
Multi-factor, for sure. Gotta love the added security, even if it means I have to remember one more thing.
upvoted 0 times
Princess
9 months ago
I think multi-factor authentication is the way to go in today's digital world.
upvoted 0 times
...
Pok
9 months ago
It's a small inconvenience to remember an extra factor, but it's worth it for the peace of mind.
upvoted 0 times
...
Rashad
9 months ago
I always feel safer knowing that my information is protected with multi-factor authentication.
upvoted 0 times
...
Ryan
10 months ago
I agree, multi-factor authentication is definitely worth the extra step for added security.
upvoted 0 times
...
...
Casie
10 months ago
Oh, this is easy! It's definitely multi-factor authentication. Using smart cards and passwords is a classic example of that.
upvoted 0 times
...
Kallie
10 months ago
I'm not sure, but I think it could also be mutual authentication.
upvoted 0 times
...
Jodi
10 months ago
I agree with Valentine, using smart cards and passwords is definitely multi-factor authentication.
upvoted 0 times
...
Valentine
11 months ago
I think the authentication method is multi-factor.
upvoted 0 times
...

Save Cancel