New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 8 Question 73 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 73
Topic #: 8
[All CSSLP Questions]

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy?

Show Suggested Answer Hide Answer
Suggested Answer: A, C, D

The security challenges for DRM are as follows:

Key hiding: It prevents tampering attacks that target the secret keys. In the key hiding process, secret keys are used for

authentication, encryption, and node-locking.

Device fingerprinting: It prevents fraud and provides secure authentication. Device fingerprinting includes the summary of hardware

and software characteristics in order to uniquely identify a device.

OTA provisioning: It provides end-to-end encryption or other secure ways for delivery of copyrighted software to mobile devices.

Answer B is incorrect. Access control is not a security challenge for DRM.


Contribute your Thoughts:

0/2000 characters
Ma
3 months ago
Surprised to see TCB mentioned, I always thought it was more niche!
upvoted 0 times
...
Leigha
3 months ago
Wait, isn't TCB just part of a larger system?
upvoted 0 times
...
Sharika
4 months ago
I disagree, I think IPSec plays a bigger role in security.
upvoted 0 times
...
Leah
4 months ago
I thought it was CDSA, but TCB makes sense too.
upvoted 0 times
...
Marylyn
4 months ago
Definitely TCB is the right answer!
upvoted 0 times
...
Thaddeus
4 months ago
I’m a bit confused. I thought IPSec was more about network security rather than the totality of protection mechanisms. Is that correct?
upvoted 0 times
...
Paola
4 months ago
I practiced a question similar to this, and I think TCB is definitely the right choice. It covers hardware and software as part of security enforcement.
upvoted 0 times
...
Tresa
5 months ago
I'm not entirely sure, but I remember something about CDSA being related to security architecture. Could it be A?
upvoted 0 times
...
Fernanda
5 months ago
I think the answer might be C, Trusted Computing Base. It seems to fit the description of all protection mechanisms working together.
upvoted 0 times
...
Leatha
5 months ago
Okay, I've got a strategy for this. I'll start by thinking about the different security controls mentioned and what they each do, then I'll choose the one that best fits the description in the question.
upvoted 0 times
...
Renea
5 months ago
I'm a little confused by the wording of this question. I'll need to re-read it a few times to make sure I'm understanding it correctly before answering.
upvoted 0 times
...
Veronika
5 months ago
The key here is understanding what a "trusted computing base" is and how it relates to the security of a computer system. I'm confident I can get this right.
upvoted 0 times
...
Christiane
5 months ago
Hmm, I'm not totally sure about this one. I'll have to think it through carefully and try to eliminate the wrong answers.
upvoted 0 times
...
Shawana
5 months ago
This looks like a tricky question, but I think I can figure it out if I break it down step-by-step.
upvoted 0 times
...
Tamekia
5 months ago
This is a good question. I'll need to consider the implications of an automatically generated system or environment.
upvoted 0 times
...
Ronna
5 months ago
Hmm, this seems like a tricky one. I'll need to think carefully about the differences between incidents and problems to decide if they can use the same categories.
upvoted 0 times
...
Toi
5 months ago
This reminds me of a practice question we had on server overloads. I lean towards Denial of Service for this one.
upvoted 0 times
...
Ailene
10 months ago
The trusted computing base? More like the 'I don't trust anything' base, am I right? But hey, at least it's keeping us safe from the cyber-boogeyman.
upvoted 0 times
Quentin
8 months ago
D) Internet Protocol Security (IPSec)
upvoted 0 times
...
Raina
8 months ago
C) Trusted computing base (TCB)
upvoted 0 times
...
Lennie
8 months ago
B) Application program interface (API)
upvoted 0 times
...
Lauran
9 months ago
D) Internet Protocol Security (IPSec)
upvoted 0 times
...
Jacquelyne
9 months ago
A) Common data security architecture (CDSA)
upvoted 0 times
...
Marsha
9 months ago
C) Trusted computing base (TCB)
upvoted 0 times
...
Iluminada
9 months ago
B) Application program interface (API)
upvoted 0 times
...
Curtis
9 months ago
A) Common data security architecture (CDSA)
upvoted 0 times
...
...
Dottie
10 months ago
C is the way to go. The other options are just pieces of the puzzle, but the TCB is the security powerhouse that rules them all!
upvoted 0 times
...
Twana
10 months ago
Hmm, I was torn between B and C, but I think C is the better choice. The trusted computing base is the real deal when it comes to system-wide security.
upvoted 0 times
Marcelle
9 months ago
User 4: Definitely, the trusted computing base is essential for enforcing security policies.
upvoted 0 times
...
Svetlana
9 months ago
User 3: I agree, C is the right answer.
upvoted 0 times
...
Dawne
10 months ago
User 2: Yeah, the trusted computing base is crucial for system-wide security.
upvoted 0 times
...
Janna
10 months ago
User 1: I think C is the better choice.
upvoted 0 times
...
...
Ammie
11 months ago
I'm going with C as well. The other options seem more like specific security protocols or interfaces, not the comprehensive security framework.
upvoted 0 times
Tyra
10 months ago
C) Trusted computing base (TCB)
upvoted 0 times
...
Carey
10 months ago
A) Common data security architecture (CDSA)
upvoted 0 times
...
...
Vallie
11 months ago
C) Trusted computing base (TCB) sounds like the right answer here. It's the whole package that enforces security policy.
upvoted 0 times
Dannette
9 months ago
Definitely, TCB is crucial for enforcing security policies in a computer system.
upvoted 0 times
...
Marjory
9 months ago
That makes sense, it's like the foundation of security controls.
upvoted 0 times
...
Leandro
9 months ago
Yes, TCB includes hardware, firmware, and software for security enforcement.
upvoted 0 times
...
Merlyn
9 months ago
I think C) Trusted computing base (TCB) is the correct answer.
upvoted 0 times
...
...
Alease
11 months ago
I'm not sure, but I think A) Common data security architecture (CDSA) could also be a possible answer.
upvoted 0 times
...
Mickie
11 months ago
I agree with Sherell. TCB is the totality of protection mechanisms within a computer system.
upvoted 0 times
...
Sherell
11 months ago
I think the answer is C) Trusted computing base (TCB). It makes sense because it encompasses all protection mechanisms.
upvoted 0 times
...

Save Cancel