Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam CSSLP Topic 3 Question 87 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 87
Topic #: 3
[All CSSLP Questions]

You work as a Network Auditor for Net Perfect Inc. The company has a Windows-based network. While auditing the company's network, you are facing problems in searching the faults and other entities that belong to it. Which of the following risks may occur due to the existence of these problems?

Show Suggested Answer Hide Answer
Suggested Answer: A, C, D

The security challenges for DRM are as follows:

Key hiding: It prevents tampering attacks that target the secret keys. In the key hiding process, secret keys are used for

authentication, encryption, and node-locking.

Device fingerprinting: It prevents fraud and provides secure authentication. Device fingerprinting includes the summary of hardware

and software characteristics in order to uniquely identify a device.

OTA provisioning: It provides end-to-end encryption or other secure ways for delivery of copyrighted software to mobile devices.

Answer B is incorrect. Access control is not a security challenge for DRM.


Contribute your Thoughts:

Leonardo
22 hours ago
I'm feeling lucky with A. Residual risk. If you can't properly audit the network, there could be lingering risks that remain even after controls have been implemented.
upvoted 0 times
...
Gail
3 days ago
Ha! Looks like the network is giving you a run for your money. I'd go with B. Secondary risk - the problems with auditing could lead to other, secondary issues popping up that you didn't anticipate.
upvoted 0 times
...
Kassandra
11 days ago
Hmm, I'm not so sure. I was leaning towards C. Detection risk, as the inability to properly audit the network could lead to issues being missed or going undetected.
upvoted 0 times
...
Tiera
12 days ago
But if we can't find the faults, wouldn't that increase the Detection risk?
upvoted 0 times
...
Shawnta
13 days ago
I think the correct answer is D. Inherent risk, since the issue with auditing the network could lead to underlying risks that are already present in the system, regardless of any controls or processes in place.
upvoted 0 times
...
Norah
18 days ago
I disagree, I believe it's A) Residual risk.
upvoted 0 times
...
Tiera
19 days ago
I think the answer is C) Detection risk.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77