Which of the following processes is BEST used to determine the extent to which modifications to an information system affect the security posture of the system?
D. Security impact analysis
Security impact analysis is the process that is best used to determine the extent to which modifications to an information system affect the security posture of the system. It involves assessing the potential security impacts of changes, updates, or modifications to the system to ensure that security is maintained or improved.
After a change/modification, security impact analysis is conducted to verify the security posture has not regressed.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Soleandheel
11 months, 1 week agoHughJassole
1 year, 5 months agoaleXplicitly
1 year, 7 months agojackdryan
1 year, 6 months agoaleXplicitly
1 year, 7 months ago