New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSEP Exam - Topic 2 Question 45 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 45
Topic #: 2
[All ISSEP Questions]

Which of the following security controls works as the totality of protection mechanisms within a

computer system, including hardware, firmware, and software, the combination of which is

responsible for enforcing a security policy?

Show Suggested Answer Hide Answer
Suggested Answer: A

Trusted computing base (TCB) refers to hardware, software, controls, and processes that cause a

computer system or network to be devoid of malicious software or hardware. Maintaining the

trusted computing base (TCB) is essential for security policy to be implemented successfully.

Answer option C is incorrect. Internet Protocol Security (IPSec) is a standard-based protocol that

provides the highest level of VPN security. IPSec can encrypt virtually everything above the

networking layer. It is used for VPN connections that use the L2TP protocol. It secures both

data and password. IPSec cannot be used with Point-to-Point Tunneling Protocol (PPTP).

Answer option B is incorrect. The Common data security architecture (CDSA) is a set of layered

security services and cryptographic framework.

It deals with the communications and data security problems in the emerging Internet and intranet

application space. It presents an

infrastructure for building cross-platform, interoperable, security-enabled applications for client-

server environments.

Answer option D is incorrect. An application programming interface (API) is an interface

implemented by a software program which enables it

to interact with other software. It facilitates interaction between different software programs similar

to the way the user interface facilitates

interaction between humans and computers. An API is implemented by applications, libraries, and

operating systems to determine their

vocabularies and calling conventions, and is used to access their services. It may include

specifications for routines, data structures, object

classes, and protocols used to communicate between the consumer and the implementer of the API.


Contribute your Thoughts:

0/2000 characters
Selma
4 months ago
I had no idea TCB was so comprehensive!
upvoted 0 times
...
Johnson
4 months ago
A is correct, but I feel like CDSA has its place too.
upvoted 0 times
...
Lonna
4 months ago
Wait, isn't TCB just part of a larger system?
upvoted 0 times
...
Jolene
4 months ago
I thought it might be B, but A makes sense too.
upvoted 0 times
...
Beatriz
5 months ago
Definitely A, Trusted Computing Base is the right answer!
upvoted 0 times
...
Venita
5 months ago
I keep mixing up these terms. I thought API was related to security, but now I'm questioning if it really fits this definition.
upvoted 0 times
...
Louvenia
5 months ago
I remember practicing a question similar to this, and TCB was definitely mentioned as a key concept. It seems like the most logical choice.
upvoted 0 times
...
Laura
5 months ago
I think the answer might be A, Trusted Computing Base. I remember it being about the overall security mechanisms in a system.
upvoted 0 times
...
Sharmaine
5 months ago
I'm not entirely sure, but I feel like CDSA could also fit. We discussed it in class, but I can't recall the specifics.
upvoted 0 times
...
Desmond
5 months ago
Okay, let's see. Increasing the vCores could help with performance, but that might not address the root cause of the timeouts. I'll have to think this through.
upvoted 0 times
...
Una
5 months ago
I'm pretty confident I know the right answer here. The correct annotation to add to line 1 is @Stateful @PassivationCapable.
upvoted 0 times
...

Save Cancel