New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 6 Question 83 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 83
Topic #: 6
[All CSSLP Questions]

DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires high integrity and medium availability?

Show Suggested Answer Hide Answer
Suggested Answer: A, C, D

The security challenges for DRM are as follows:

Key hiding: It prevents tampering attacks that target the secret keys. In the key hiding process, secret keys are used for

authentication, encryption, and node-locking.

Device fingerprinting: It prevents fraud and provides secure authentication. Device fingerprinting includes the summary of hardware

and software characteristics in order to uniquely identify a device.

OTA provisioning: It provides end-to-end encryption or other secure ways for delivery of copyrighted software to mobile devices.

Answer B is incorrect. Access control is not a security challenge for DRM.


Contribute your Thoughts:

0/2000 characters
Latricia
3 months ago
Nope, MAC III is definitely correct.
upvoted 0 times
...
Glory
3 months ago
Surprised to see MAC III is the answer!
upvoted 0 times
...
Margot
3 months ago
I thought MAC II had those requirements?
upvoted 0 times
...
Lore
4 months ago
Totally agree, MAC III fits that description!
upvoted 0 times
...
Clement
4 months ago
MAC III is the one with high integrity and medium availability.
upvoted 0 times
...
Glen
4 months ago
I thought MAC IV had higher availability requirements, so I’m pretty sure it’s not that one. Could it really be MAC II?
upvoted 0 times
...
Refugia
4 months ago
I’m leaning towards MAC II as well, but I could be mixing it up with another question we practiced.
upvoted 0 times
...
Tiera
4 months ago
I remember studying the MAC levels, and I feel like MAC III might be the answer, but it’s been a while since I reviewed that section.
upvoted 0 times
...
Santos
5 months ago
I think MAC II is the one that requires high integrity and medium availability, but I’m not completely sure.
upvoted 0 times
...
Lettie
5 months ago
This is a good question to test our understanding of the MAC levels. I'll review the key details about each one and then select the answer that matches the high integrity and medium availability requirement.
upvoted 0 times
...
Luis
5 months ago
I'm not totally confident on this one. The MAC levels and their requirements can be tricky to keep straight. I'll have to carefully consider each option and try to eliminate the ones that don't fit the criteria.
upvoted 0 times
...
Orville
5 months ago
Okay, I got this. The question is asking which MAC level has high integrity and medium availability, and that's MAC III. I remember learning that in class.
upvoted 0 times
...
Aleta
5 months ago
Hmm, I'm a bit confused on the MAC levels and what each one requires. I'll need to review my notes on DoD 8500.2 to make sure I understand the differences between them.
upvoted 0 times
...
Maxima
5 months ago
I'm pretty sure this is asking about the MAC levels and their requirements. Let me think through this - MAC III requires high integrity and medium availability, so that's the answer.
upvoted 0 times
...
Artie
5 months ago
Okay, let's think this through. The servers didn't lose power, but the whole rack was inaccessible. That makes me think the issue is probably with the rack power or the switch power. I'll go with B, rack power, as my first choice.
upvoted 0 times
...
Richelle
5 months ago
I'm a little confused on the difference between the accrual basis and the modified statement of operations. I'll have to review my notes to make sure I understand which one this question is asking about.
upvoted 0 times
...
Velda
5 months ago
I think the answer might be VRF, since it supports separate routing instances for multiple tenants.
upvoted 0 times
...
Laquita
5 months ago
I'm a bit unsure about this one. Caching the packages might help, but I'm not sure if that's the only solution or if there are other ways to optimize the pipeline execution time.
upvoted 0 times
...
Glory
5 months ago
Okay, I think I've got it. The question is asking for the best way, and that would be to use the MAC address filtering feature on the access point. That's the most secure and straightforward solution.
upvoted 0 times
...
Bea
10 months ago
If this was a hacking exam, I'd say the answer is 'all of the above'! But since it's DoD 8500.2, I'll go with D) MAC II. Boring, but effective.
upvoted 0 times
Yasuko
10 months ago
Yeah, it's important to follow the guidelines set by DoD 8500.2.
upvoted 0 times
...
Brice
10 months ago
I agree, D) MAC II is the correct answer.
upvoted 0 times
...
...
Cordelia
11 months ago
Oh, that makes sense. Thanks for explaining.
upvoted 0 times
...
Melynda
11 months ago
Eve
upvoted 0 times
Yuki
9 months ago
D) MAC II
upvoted 0 times
...
Melodie
9 months ago
C) MAC I
upvoted 0 times
...
Odette
10 months ago
B) MAC IV
upvoted 0 times
...
Kaycee
10 months ago
A) MAC III
upvoted 0 times
...
...
Santos
11 months ago
I disagree, I believe the answer is MAC II because it requires high integrity and medium availability.
upvoted 0 times
...
Cordelia
11 months ago
I think the answer is MAC III.
upvoted 0 times
...

Save Cancel