Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam CSSLP Topic 4 Question 81 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 81
Topic #: 4
[All CSSLP Questions]

Which of the following security models dictates that subjects can only access objects through applications?

Show Suggested Answer Hide Answer
Suggested Answer: C

The DAA, also known as Authorizing Official, makes the final accreditation decision. The Designated Approving Authority (DAA), in the United

States Department of Defense, is the official with the authority to formally assume responsibility for operating a system at an acceptable level

of risk. The DAA is responsible for implementing system security. The DAA can grant the accreditation and can determine that the system's

risks are not at an acceptable level and the system is not ready to be operational.

Answer D is incorrect. An Information System Security Officer (ISSO) plays the role of a supporter. The responsibilities of an Information

System Security Officer (ISSO) are as follows:

Manages the security of the information system that is slated for Certification & Accreditation (C&A).

Insures the information systems configuration with the agency's information security policy.

Supports the information system owner/information owner for the completion of security-related responsibilities.

Takes part in the formal configuration management process.

Prepares Certification & Accreditation (C&A) packages.

Answer A is incorrect. An Information System Security Engineer (ISSE) plays the role of an advisor. The responsibilities of an

Information System Security Engineer are as follows:

Provides view on the continuous monitoring of the information system.

Provides advice on the impacts of system changes.

Takes part in the configuration management process.

Takes part in the development activities that are required to implement system changes.

Follows approved system changes.

Answer B is incorrect. A Chief Risk Officer (CRO) is also known as Chief Risk Management Officer (CRMO). The Chief Risk Officer or Chief

Risk Management Officer of a corporation is the executive accountable for enabling the efficient and effective governance of significant risks,

and related opportunities, to a business and its various segments. Risks are commonly categorized as strategic, reputational, operational,

financial, or compliance-related. CRO's are accountable to the Executive Committee and The Board for enabling the business to balance risk

and reward. In more complex organizations, they are generally responsible for coordinating the organization's Enterprise Risk Management

(ERM) approach.


Contribute your Thoughts:

Delila
21 hours ago
Ah, the classic Clark-Wilson model! I remember learning about that in my security course. Gotta love those nice, tight access controls.
upvoted 0 times
...
Ozell
12 days ago
But Bell-LaPadula enforces the no read up/no write down policy, which fits the description of subjects accessing objects through applications.
upvoted 0 times
...
Aliza
13 days ago
Hmm, this one's tricky. I think the Clark-Wilson model is the answer, since it focuses on controlling access through applications rather than direct object access.
upvoted 0 times
...
Thaddeus
14 days ago
I disagree, I believe it's A) Biba model.
upvoted 0 times
...
Ozell
16 days ago
I think the answer is B) Bell-LaPadula.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77