New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 4 Question 81 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 81
Topic #: 4
[All CSSLP Questions]

Which of the following security models dictates that subjects can only access objects through applications?

Show Suggested Answer Hide Answer
Suggested Answer: C

The DAA, also known as Authorizing Official, makes the final accreditation decision. The Designated Approving Authority (DAA), in the United

States Department of Defense, is the official with the authority to formally assume responsibility for operating a system at an acceptable level

of risk. The DAA is responsible for implementing system security. The DAA can grant the accreditation and can determine that the system's

risks are not at an acceptable level and the system is not ready to be operational.

Answer D is incorrect. An Information System Security Officer (ISSO) plays the role of a supporter. The responsibilities of an Information

System Security Officer (ISSO) are as follows:

Manages the security of the information system that is slated for Certification & Accreditation (C&A).

Insures the information systems configuration with the agency's information security policy.

Supports the information system owner/information owner for the completion of security-related responsibilities.

Takes part in the formal configuration management process.

Prepares Certification & Accreditation (C&A) packages.

Answer A is incorrect. An Information System Security Engineer (ISSE) plays the role of an advisor. The responsibilities of an

Information System Security Engineer are as follows:

Provides view on the continuous monitoring of the information system.

Provides advice on the impacts of system changes.

Takes part in the configuration management process.

Takes part in the development activities that are required to implement system changes.

Follows approved system changes.

Answer B is incorrect. A Chief Risk Officer (CRO) is also known as Chief Risk Management Officer (CRMO). The Chief Risk Officer or Chief

Risk Management Officer of a corporation is the executive accountable for enabling the efficient and effective governance of significant risks,

and related opportunities, to a business and its various segments. Risks are commonly categorized as strategic, reputational, operational,

financial, or compliance-related. CRO's are accountable to the Executive Committee and The Board for enabling the business to balance risk

and reward. In more complex organizations, they are generally responsible for coordinating the organization's Enterprise Risk Management

(ERM) approach.


Contribute your Thoughts:

0/2000 characters
Jamal
3 months ago
I always mix those up, but yeah, Clark-Wilson makes sense!
upvoted 0 times
...
Melvin
3 months ago
Nope, definitely Clark-Wilson. It's about integrity through applications.
upvoted 0 times
...
Matt
3 months ago
Wait, are we sure? I thought it was Bell-LaPadula.
upvoted 0 times
...
Lashunda
4 months ago
Totally agree, Clark-Wilson is all about that application access.
upvoted 0 times
...
Angella
4 months ago
It's the Clark-Wilson model!
upvoted 0 times
...
Winifred
4 months ago
I feel like the Clark-Wilson model is the one that specifies using applications for access, but I could be mixing it up with something else.
upvoted 0 times
...
Ira
4 months ago
I practiced a similar question, and I think the Biba model is about integrity, so it can't be the right choice here.
upvoted 0 times
...
Oretha
4 months ago
I'm not entirely sure, but I remember the Bell-LaPadula model focuses more on confidentiality rather than application access.
upvoted 0 times
...
Karon
5 months ago
I think the answer might be the Clark-Wilson model since it emphasizes integrity and requires access through applications.
upvoted 0 times
...
Sanjuana
5 months ago
I'm a bit confused by this question. The security models can be tricky to keep straight. I know the Biba model is about integrity, but I'm not sure if that's the one that requires access through applications. I'll have to review my notes on these models before I can feel confident answering this.
upvoted 0 times
...
Shanice
5 months ago
Okay, let me see if I can work this out. The Clark-Wilson model is focused on ensuring the integrity of data, and it does this by requiring that all access to objects goes through verified applications. I think that's the key here. I'll mark that as my answer.
upvoted 0 times
...
German
5 months ago
Hmm, I'm not entirely sure about this one. I know the Biba model is about integrity, and the Bell-LaPadula model is about confidentiality, but I'm a bit fuzzy on the details of the Clark-Wilson model. I'll have to think this through carefully.
upvoted 0 times
...
Quentin
5 months ago
I think the Clark-Wilson model is the one that dictates subjects can only access objects through applications. I'm pretty confident about that.
upvoted 0 times
...
Bernardine
5 months ago
I've got this! The answer is A - Agent ID (AID) and Target Process ID. I remember covering this in the last lecture.
upvoted 0 times
...
Roxanne
5 months ago
I'm a bit confused on this one. I know the XMAS scan is used to detect firewall rules, but I'm not sure how that relates to the port state. Guess I'll have to review my network security concepts.
upvoted 0 times
...
Ling
10 months ago
Haha, the Biba-Clark model? What is this, a security model fusion dance? I'm going with good old Clark-Wilson on this one.
upvoted 0 times
...
Cecil
10 months ago
Wait, is this a trick question? I thought the Biba model was all about integrity, not access controls. Maybe I need to brush up on my security models.
upvoted 0 times
Julian
8 months ago
That's right, the Biba model is not about access controls.
upvoted 0 times
...
Evan
9 months ago
Yeah, the Biba model is more about integrity levels, not access restrictions.
upvoted 0 times
...
Shawna
9 months ago
I think the Biba model focuses on integrity, not access controls.
upvoted 0 times
...
German
9 months ago
D) Biba-Clark model
upvoted 0 times
...
Lavonna
9 months ago
C) Clark-Wilson
upvoted 0 times
...
Staci
9 months ago
B) Bell-LaPadula
upvoted 0 times
...
Glory
9 months ago
A) Biba model
upvoted 0 times
...
...
Delila
10 months ago
Ah, the classic Clark-Wilson model! I remember learning about that in my security course. Gotta love those nice, tight access controls.
upvoted 0 times
Lajuana
9 months ago
The Biba model is great for ensuring integrity in the system.
upvoted 0 times
...
Cornell
9 months ago
I think the Bell-LaPadula model is also important for controlling access levels.
upvoted 0 times
...
Cathern
9 months ago
The Biba-Clark model combines elements of both Biba and Clark-Wilson for a comprehensive security approach.
upvoted 0 times
...
Gary
9 months ago
I agree, the Clark-Wilson model is essential for maintaining security.
upvoted 0 times
...
Daren
9 months ago
I think the Biba model is more suitable for integrity protection.
upvoted 0 times
...
Pearly
10 months ago
I prefer the Bell-LaPadula model for its strict confidentiality rules.
upvoted 0 times
...
Viki
10 months ago
I agree, the Clark-Wilson model is a solid choice for access control.
upvoted 0 times
...
...
Ozell
10 months ago
But Bell-LaPadula enforces the no read up/no write down policy, which fits the description of subjects accessing objects through applications.
upvoted 0 times
...
Aliza
10 months ago
Hmm, this one's tricky. I think the Clark-Wilson model is the answer, since it focuses on controlling access through applications rather than direct object access.
upvoted 0 times
Shad
10 months ago
I think you're right, the Biba model and Bell-LaPadula focus more on integrity and confidentiality.
upvoted 0 times
...
Jerry
10 months ago
I agree, the Clark-Wilson model is all about application-based access control.
upvoted 0 times
...
...
Thaddeus
11 months ago
I disagree, I believe it's A) Biba model.
upvoted 0 times
...
Ozell
11 months ago
I think the answer is B) Bell-LaPadula.
upvoted 0 times
...

Save Cancel