New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 4 Question 3 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 3
Topic #: 4
[All CSSLP Questions]

Which of the following types of redundancy prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data?

Show Suggested Answer Hide Answer
Suggested Answer: C

Process redundancy permits software to run simultaneously on multiple geographically distributed locations, with voting on results. It

prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data.


Contribute your Thoughts:

0/2000 characters
Maurine
4 months ago
Data redundancy doesn't help with physical attacks.
upvoted 0 times
...
Aileen
4 months ago
Really? I doubt hardware redundancy is enough.
upvoted 0 times
...
Brynn
4 months ago
Wait, isn't application redundancy also important?
upvoted 0 times
...
Annett
4 months ago
Totally agree, physical control is a big risk!
upvoted 0 times
...
Leota
5 months ago
I think hardware redundancy is key here.
upvoted 0 times
...
Shawnta
5 months ago
I feel like process redundancy could also be relevant, but I can't recall how it directly relates to physical security.
upvoted 0 times
...
Joseph
5 months ago
I think hardware redundancy might be the answer since it involves having backup systems to prevent unauthorized access.
upvoted 0 times
...
Golda
5 months ago
I remember studying about redundancy types, but I'm not sure which one specifically addresses physical control attacks.
upvoted 0 times
...
Glenn
5 months ago
I practiced a similar question where application redundancy was mentioned, but I don't think it fits this scenario.
upvoted 0 times
...
Nicholle
5 months ago
Hmm, this seems like a tricky one. I'll need to think through the different documents mentioned and how they relate to the architecture and implementation organizations.
upvoted 0 times
...
Tina
5 months ago
I think the answer is B. basic. The HTTP headers in the image look like they're using basic authentication, which is a common and relatively simple method.
upvoted 0 times
...
Glennis
5 months ago
I'm a bit confused by this question. I'll have to review my notes on programme management documents to decide which one is the best answer.
upvoted 0 times
...
Twila
5 months ago
Hmm, I'm a bit unsure about this one. The options seem similar, so I'll need to really focus on the key differences to determine the right answer.
upvoted 0 times
...
Laila
5 months ago
I remember discussing the ethical implications of working for two towns that are so similar. I think we covered how important disclosure is in these cases, but I'm a bit unsure about the specific rules to follow.
upvoted 0 times
...

Save Cancel