New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 3 Question 98 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 98
Topic #: 3
[All CSSLP Questions]

A security policy is an overall general statement produced by senior management that dictates what role security plays within the

organization. Which of the following are required to be addressed in a well designed policy?

Each correct answer represents a part of the solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: D

The Federal Information Security Management Act of 2002 is a United States federal law enacted in 2002 as Title III of the E-Government Act

of 2002. The act recognized the importance of information security to the economic and national security interests of the United States. The

act requires each federal agency to develop, document, and implement an agency-wide program to provide information security for the

information and information systems that support the operations and assets of the agency, including those provided or managed by another

agency, contractor, or other source.

FISMA has brought attention within the federal government to cybersecurity and explicitly emphasized a 'risk-based policy for cost-effective

security'. FISMA requires agency program officials, chief information officers, and Inspectors Generals (IGs) to conduct annual reviews of the

agency's information security program and report the results to Office of Management and Budget (OMB). OMB uses this data to assist in its

oversight responsibilities and to prepare this annual report to Congress on agency compliance with the act.

Answer B is incorrect. The Lanham Act is a piece of legislation that contains the federal statutes of trademark law in the United States.

The Act prohibits a number of activities, including trademark infringement, trademark dilution, and false advertising. It is also called Lanham

Trademark Act.

Answer A is incorrect. The Computer Misuse Act 1990 is an act of the UK Parliament which states the following statement:

Unauthorized access to the computer material is punishable by 6 months imprisonment or a fine 'not exceeding level 5 on the standard

scale' (currently 5000).

Unauthorized access with the intent to commit or facilitate commission of further offences is punishable by 6 months/maximum fine on

summary conviction or 5 years/fine on indictment.

Unauthorized modification of computer material is subject to the same sentences as section 2 offences.

Answer C is incorrect. The Computer Fraud and Abuse Act is a law passed by the United States Congress in 1984 intended to reduce

cracking of computer systems and to address federal computer-related offenses. The Computer Fraud and Abuse Act (codified as 18 U.S.C.

1030) governs cases with a compelling federal interest, where computers of the federal government or certain financial institutions are

involved, where the crime itself is interstate in nature, or computers used in interstate and foreign commerce. It was amended in 1986, 1994,

1996, in 2001 by the USA PATRIOT Act, and in 2008 by the Identity Theft Enforcement and Restitution Act. Section (b) of the act punishes

anyone who not just commits or attempts to commit an offense under the Computer Fraud and Abuse Act but also those who conspire to do

so.


Contribute your Thoughts:

0/2000 characters
Judy
2 months ago
I agree, but isn't it more about the risks than who exploits them?
upvoted 0 times
...
Chery
2 months ago
Compliance is key! Everyone should know their role in the policy.
upvoted 0 times
...
Francis
2 months ago
Definitely need to know what is being secured!
upvoted 0 times
...
Annmarie
3 months ago
Wait, do we really need to know who might exploit vulnerabilities? Seems a bit much.
upvoted 0 times
...
Laquanda
3 months ago
Where's the mention of ongoing training? That's super important too!
upvoted 0 times
...
Lucy
3 months ago
I believe D is important too because knowing who needs to comply helps enforce the policy effectively.
upvoted 0 times
...
Jovita
3 months ago
I practiced a similar question where identifying vulnerabilities was crucial, so I think B is also essential for a solid policy.
upvoted 0 times
...
Renea
4 months ago
I’m not entirely sure about option C; it seems relevant, but I feel like it might be more about compliance than exploitation.
upvoted 0 times
...
Veronica
4 months ago
I remember discussing the importance of defining what is being secured in a policy, so I think option A is definitely a key part.
upvoted 0 times
...
Colene
4 months ago
This is a tricky one. I'm not totally confident I know all the required elements of a comprehensive security policy. I'll have to review my notes and try to reason through the key components.
upvoted 0 times
...
Huey
4 months ago
I've got this! The policy needs to address what's being secured, where the threats are, who might try to exploit the vulnerabilities, and who the policy applies to. Piece of cake!
upvoted 0 times
...
Rosamond
4 months ago
Okay, let's see. I think the policy should define what assets are being protected, where the risks and vulnerabilities lie, and who is expected to follow the policy. That seems like the logical approach.
upvoted 0 times
...
Cruz
5 months ago
Hmm, I'm a bit unsure about this one. I know a security policy sets the overall direction, but I'm not sure exactly what needs to be covered. I'll have to think it through carefully.
upvoted 0 times
...
Stephanie
5 months ago
This question seems straightforward. I think the key is to identify the core elements that a well-designed security policy should address.
upvoted 0 times
...
Vincent
10 months ago
Wow, C? I mean, I get that you want to be thorough, but that's just inviting hackers to try their luck. A, D, and possibly B are the way to go, my friends.
upvoted 0 times
Yolande
9 months ago
D) Who is expected to comply with the policy?
upvoted 0 times
...
Kati
10 months ago
B) Where is the vulnerability, threat, or risk?
upvoted 0 times
...
Beula
10 months ago
A) What is being secured?
upvoted 0 times
...
...
Tien
10 months ago
Haha, C? Really? I can just see the policy now: 'All employees must be on the lookout for the nefarious Mr. X and his dastardly plans.' A, D, and maybe B are the way to go, for sure.
upvoted 0 times
Peggie
9 months ago
D) Who is expected to comply with the policy?
upvoted 0 times
...
Lashawnda
9 months ago
B) Where is the vulnerability, threat, or risk?
upvoted 0 times
...
Leila
9 months ago
A) What is being secured?
upvoted 0 times
...
...
Margarita
10 months ago
Come on, C? Who cares who's expected to exploit the vulnerability? That's just asking for trouble. A, D, and maybe B are the way to go.
upvoted 0 times
...
Nikita
11 months ago
I believe C should also be addressed in a security policy, as understanding who may exploit vulnerabilities is important for mitigation strategies.
upvoted 0 times
...
Leigha
11 months ago
I agree, A and D are essential. But I also think B is important - you need to understand the risks and vulnerabilities you're trying to address.
upvoted 0 times
Dortha
9 months ago
B) Where is the vulnerability, threat, or risk?
upvoted 0 times
...
Tayna
9 months ago
Definitely, knowing what needs to be secured and who needs to follow the policy are key.
upvoted 0 times
...
Rosenda
9 months ago
D) Who is expected to comply with the policy?
upvoted 0 times
...
Stevie
9 months ago
A) What is being secured?
upvoted 0 times
...
Macy
9 months ago
Yes, understanding the risks and vulnerabilities is crucial.
upvoted 0 times
...
Rodney
9 months ago
D) Who is expected to comply with the policy?
upvoted 0 times
...
Edward
9 months ago
B) Where is the vulnerability, threat, or risk?
upvoted 0 times
...
Chantell
9 months ago
A) What is being secured?
upvoted 0 times
...
Gayla
9 months ago
A) What is being secured?
upvoted 0 times
...
Roxane
9 months ago
D) Who is expected to comply with the policy?
upvoted 0 times
...
Lanie
9 months ago
User 2: I agree, understanding the vulnerabilities and risks with B is crucial too.
upvoted 0 times
...
Yesenia
10 months ago
B) Where is the vulnerability, threat, or risk?
upvoted 0 times
...
Marleen
10 months ago
User 1: A and D are definitely important for a security policy.
upvoted 0 times
...
Oretha
10 months ago
A) What is being secured?
upvoted 0 times
...
...
Kanisha
11 months ago
A and D are definitely part of a well-designed security policy. You need to know what assets are being protected and who is responsible for following the policy.
upvoted 0 times
...
Marylin
11 months ago
I agree with you, Jenifer. Those aspects are crucial for a comprehensive security policy.
upvoted 0 times
...
Jenifer
11 months ago
I think A, B, and D are required in a well designed security policy.
upvoted 0 times
...

Save Cancel