New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 8 Question 38 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 38
Topic #: 8
[All CSSLP Questions]

You are responsible for network and information security at a metropolitan police station. The most important concern is that unauthorized parties are not able to access data. What is this called?

Show Suggested Answer Hide Answer
Suggested Answer: A

The CIA (Confidentiality, Integrity, and Availability) triangle is concerned with three facets of security. Confidentiality is the concern that data

be secure from unauthorized access.

Answer B and C are incorrect. The CIA (Confidentiality, Integrity, and Availability) triangle is concerned with three facets of security.

Integrity is the concern that data not be altered without it being traceable. Availability is the concern that the data, while being secured, is

readily accessible.

Answer D is incorrect. Confidentiality may be implemented with encryption but encryption is just a technique to obtain confidentiality.


Contribute your Thoughts:

0/2000 characters
Fredric
4 months ago
I thought encryption was the main focus here?
upvoted 0 times
...
Johanna
4 months ago
Yup, confidentiality is key for sensitive data.
upvoted 0 times
...
Zona
4 months ago
Wait, are we sure it's not integrity?
upvoted 0 times
...
Delila
4 months ago
I agree, it's all about keeping info safe.
upvoted 0 times
...
Pamella
5 months ago
That's definitely called confidentiality!
upvoted 0 times
...
Shelba
5 months ago
I’m a bit confused; could it also be about integrity? I remember those terms being closely related.
upvoted 0 times
...
Kenny
5 months ago
I practiced a similar question last week, and I think the answer was definitely confidentiality.
upvoted 0 times
...
Christene
5 months ago
I'm not entirely sure, but I remember something about the CIA triad. Isn't confidentiality part of that?
upvoted 0 times
...
Fannie
5 months ago
I think this is about keeping data safe from unauthorized access, which sounds like confidentiality, right?
upvoted 0 times
...
Adelle
5 months ago
Okay, let me think this through. The question says the user wants to enable detailed monitoring, so I'm guessing that means the current launch config has it disabled. In that case, I think option D is the way to go - create a new launch config with detailed monitoring enabled and update the Auto Scaling group.
upvoted 0 times
...
Irma
5 months ago
This one seems pretty straightforward. I'm pretty sure the answer is C - Yes/No.
upvoted 0 times
...
Reid
5 months ago
I think the key is to focus on the level of complexity and scalability required for each web application. SAS is more basic, so simpler sites like a personal blog or test environment would work well there.
upvoted 0 times
...
Dulce
5 months ago
Okay, let me think this through. The exhibit shows the top two models for each subset, so I'll need to analyze those to determine the most parsimonious one.
upvoted 0 times
...
Ashlyn
5 months ago
Deploying sounds like it could affect the system, but I might be confusing it with something else. Configuring seems safer!
upvoted 0 times
...

Save Cancel