Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam CSSLP Topic 1 Question 72 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 72
Topic #: 1
[All CSSLP Questions]

The Web resource collection is a security constraint element summarized in the Java Servlet Specification v2.4. Which of the following elements does it include?

Each correct answer represents a complete solution. Choose two.

Show Suggested Answer Hide Answer
Suggested Answer: B

Configuration auditing is a component of configuration management, which involves periodic checks to establish the consistency and

completeness of accounting information and to confirm that all configuration management policies are being followed. Configuration audits are

broken into functional and physical configuration audits. They occur either at delivery or at the moment of effecting the change. A functional

configuration audit ensures that functional and performance attributes of a configuration item are achieved, while a physical configuration

audit ensures that a configuration item is installed in accordance with the requirements of its detailed design documentation.

Answer D is incorrect. The configuration status accounting procedure is the ability to record and report on the configuration baselines

associated with each configuration item at any moment of time. It supports the functional and physical attributes of software at various points

in time, and performs systematic control of accounting to the identified attributes for the purpose of maintaining software integrity and

traceability throughout the software development life cycle.

Answer C is incorrect. Configuration control is a procedure of the Configuration management. Configuration control is a set of

processes and approval stages required to change a configuration item's attributes and to re-baseline them. It supports the change of the

functional and physical attributes of software at various points in time, and performs systematic control of changes to the identified attributes.

Answer A is incorrect. Configuration identification is the process of identifying the attributes that define every aspect of a configuration

item. A configuration item is a product (hardware and/or software) that has an end-user purpose. These attributes are recorded in

configuration documentation and baselined. Baselining an attribute forces formal configuration change control processes to be effected in the

event that these attributes are changed.


Contribute your Thoughts:

Isabella
10 days ago
D and B look like the right answers to me. The web resource collection is all about URL patterns and role names, not HTTP methods or transport guarantees.
upvoted 0 times
...
Lavonna
16 days ago
I'm not sure about the other options, but HTTP methods and URL patterns make sense for security constraints.
upvoted 0 times
...
Roosevelt
21 days ago
I agree with Carin. HTTP methods and URL patterns are definitely part of the security constraint element.
upvoted 0 times
...
Carin
22 days ago
I think the Web resource collection includes HTTP methods and URL patterns.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77