New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSEP Exam - Topic 4 Question 63 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 63
Topic #: 4
[All ISSEP Questions]

Which of the following security controls is a set of layered security services that address communications and data security problems in the emerging Internet and intranet application space

Show Suggested Answer Hide Answer
Suggested Answer: B

Answer option A is incorrect. The Defense Technical Information Center (DTIC) is a repository of

scientific and technical documents for the United States Department of Defense. DTIC serves the

DoD community as the largest central resource for DoD and government-funded scientific, technical,

engineering, and business related information available today. DTIC's documents are available to

DoD personnel and defense contractors, with unclassified documents also available to the public.

DTIC's aim is to serve a vital link in the transfer of information among DoD personnel, DoD

contractors, and potential contractors and other U.S. Government agency personnel and their

contractors. Answer option D is incorrect. The Defense Advanced Research Projects Agency (DARPA)

is an agency of the United States Department of Defense responsible for the development of new

technology for use by the military. DARPA has been responsible for funding the development of

many technologies which have had a major effect on the world, including computer networking, as

well as NLS, which was both the first hypertext system, and an important precursor to the

contemporary ubiquitous graphical user interface. DARPA supplies technological options for the

entire Department, and is designed to be the 'technological engine' for transforming DoD. Answer

option C is incorrect. The Defense-wide Information Assurance Program (DIAP) protects and

supports DoD information, information systems, and information networks, which is important to

the Department and the armed forces throughout the day-to-day operations, and in the time of

crisis.The DIAP uses the OSD method to plan, observe, organize, and incorporate IA activities. The

role of DIAP is to act as a facilitator for program execution by the combatant commanders, Military

Services, and Defense Agencies. The DIAP staff combines functional and programmatic skills for a

comprehensive Defense-wide approach to IA. The DIAP's main objective is to ensure that the DoD's

vital information resources are secured and protected by incorporating IA activities to get a secure

net-centric GIG operation enablement and information supremacy by applying a Defense-in-Depth

methodology that integrates the capabilities of people, operations, and technology to establish a

multi-layer, multidimensional protection.


Contribute your Thoughts:

0/2000 characters
Jesusa
4 months ago
Nah, I think APIs play a bigger role in security than people realize.
upvoted 0 times
...
Luther
4 months ago
Wait, I didn't know IPSec was that comprehensive!
upvoted 0 times
...
Laine
4 months ago
I thought CDSA was more relevant for layered security, but maybe I'm wrong?
upvoted 0 times
...
Ming
4 months ago
Totally agree, IPSec is the go-to for data security over networks!
upvoted 0 times
...
Jenelle
4 months ago
I'm pretty sure it's A, IPSec is all about securing communications.
upvoted 0 times
...
Valentin
5 months ago
I feel like API isn't the right choice here, but I can't remember what it specifically does in terms of security.
upvoted 0 times
...
Hermila
5 months ago
File encryptors seem too narrow for this question; they focus on data at rest rather than layered security for communications.
upvoted 0 times
...
Allene
5 months ago
I remember studying CDSA, but I can't recall if it specifically addresses layered security services like the question mentions.
upvoted 0 times
...
Margret
5 months ago
I think it might be IPSec since it deals with securing communications over the Internet, but I'm not entirely sure.
upvoted 0 times
...
Harley
5 months ago
Okay, let me think this through step-by-step. I'll eliminate the options that don't seem relevant and then make my best guess.
upvoted 0 times
...
Iluminada
5 months ago
This looks pretty straightforward. I think I can handle this one.
upvoted 0 times
...
Tony
5 months ago
This is straightforward. A button on a Windows dialog is a momentary switch that changes state when pressed and released. So the correct answer is B, "Switch When Released".
upvoted 0 times
...
Roslyn
5 months ago
Okay, I've got this. For a PaaS solution, you'd want to implement failover groups or Always On availability groups to meet the disaster recovery requirements. Those options will provide the redundancy and failover capabilities you need.
upvoted 0 times
...
Hyun
9 months ago
CDSA? Sounds like a security protocol designed by a group of accountants. 'Common Data Security Arithmetic', anyone?
upvoted 0 times
...
Ria
9 months ago
IPSec? More like 'I-Spy-Sec', am I right? Gotta keep those hackers on their toes!
upvoted 0 times
...
Ashley
9 months ago
API? Really? That's more about secure programming, not network-level security. Nice try, but no dice.
upvoted 0 times
Laura
8 months ago
D) Application program interface (API)
upvoted 0 times
...
Donette
8 months ago
C) File encryptors
upvoted 0 times
...
Lindsey
9 months ago
B) Common data security architecture (CDSA)
upvoted 0 times
...
Isreal
9 months ago
A) Internet Protocol Security (IPSec)
upvoted 0 times
...
...
Boris
10 months ago
File encryptors? That's just basic stuff. I need something more comprehensive for this exam.
upvoted 0 times
Justa
8 months ago
D) Application program interface (API)
upvoted 0 times
...
Doug
8 months ago
C) File encryptors
upvoted 0 times
...
Arlene
9 months ago
B) Common data security architecture (CDSA)
upvoted 0 times
...
Silvana
9 months ago
A) Internet Protocol Security (IPSec)
upvoted 0 times
...
...
Walton
10 months ago
CDSA? Sounds like some kind of corporate security buzzword. I'll pass on that one.
upvoted 0 times
Wai
9 months ago
D) Application program interface (API)
upvoted 0 times
...
Lang
9 months ago
C) File encryptors
upvoted 0 times
...
Emogene
9 months ago
B) Common data security architecture (CDSA)
upvoted 0 times
...
Lasandra
10 months ago
A) Internet Protocol Security (IPSec)
upvoted 0 times
...
...
Ena
11 months ago
IPSec sounds like the right answer here. It's a well-known security protocol that protects communications at the network layer.
upvoted 0 times
Brendan
9 months ago
APIs are important, but not the right answer in this context.
upvoted 0 times
...
Virgina
9 months ago
D) Application program interface (API)
upvoted 0 times
...
Renea
9 months ago
That's not the correct answer for this question.
upvoted 0 times
...
Ailene
9 months ago
B) Common data security architecture (CDSA)
upvoted 0 times
...
Pearline
9 months ago
Yes, IPSec is a set of layered security services that address communications and data security.
upvoted 0 times
...
Cammy
9 months ago
A) Internet Protocol Security (IPSec)
upvoted 0 times
...
...
Alba
11 months ago
I'm not sure, but I think C) File encryptors could also be a valid option for addressing data security problems
upvoted 0 times
...
Terrilyn
11 months ago
I agree with Yvonne, IPSec provides layered security services for communications and data security
upvoted 0 times
...
Yvonne
11 months ago
I think the answer is A) Internet Protocol Security (IPSec)
upvoted 0 times
...

Save Cancel