New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 4 Question 50 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 50
Topic #: 4
[All CSSLP Questions]

Which of the following security objectives are defined for information and information systems by the FISMA? Each correct answer represents a part of the solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: B, C, D

FISMA defines the following three security objectives for information and information systems:

Confidentiality: It means that the data should only be accessible to authorized users. Access includes printing, displaying, and other

such forms of disclosure, including simply revealing the existence of an object.

Integrity: It means that only authorized users are able to modify data. Modification admits changing, changing the status, deleting, and

creating.

Availability: It means that the data should only be available to authorized users.

Answer A is incorrect. Authenticity is not defined by the FISMA as one of the security objectives for information and information

systems.


Contribute your Thoughts:

0/2000 characters
Xuan
4 months ago
Sounds right, but I thought there were more objectives in FISMA.
upvoted 0 times
...
Hollis
4 months ago
Yup, all four are essential for info security!
upvoted 0 times
...
Wilda
4 months ago
Wait, are we sure about authenticity being one of them?
upvoted 0 times
...
Annett
4 months ago
Totally agree, those are the key objectives!
upvoted 0 times
...
Serina
5 months ago
FISMA covers authenticity, availability, integrity, and confidentiality.
upvoted 0 times
...
Martina
5 months ago
I’m pretty sure all four options are important, but I recall that availability and integrity are emphasized in the context of FISMA.
upvoted 0 times
...
Marguerita
5 months ago
I feel like confidentiality is a big part of FISMA too, but I’m not 100% certain about authenticity.
upvoted 0 times
...
Kathryn
5 months ago
I think FISMA focuses on the core principles of information security, but I’m not entirely sure if authenticity is one of them.
upvoted 0 times
...
Chu
5 months ago
I remember practicing a similar question where availability and integrity were definitely mentioned as key objectives.
upvoted 0 times
...
Leonora
5 months ago
This looks like a straightforward question about agile teams. I think the key is to focus on the characteristics that define an agile approach, like iterative delivery and continuous improvement.
upvoted 0 times
...
Blair
5 months ago
I vaguely remember that SAML is related to identity management, but I'm not sure if it specifically fits the Data Origin Authentication pattern.
upvoted 0 times
...
Valentin
5 months ago
This question seems straightforward. I'll focus on identifying the finding that should be given the highest priority.
upvoted 0 times
...

Save Cancel