Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 472 discussion

Actual exam question from ISC's CISSP
Question #: 472
Topic #: 1
[All CISSP Questions]

Which of the following processes is BEST used to determine the extent to which modifications to an information system affect the security posture of the system?

  • A. Patch management
  • B. Continuous monitoring
  • C. Configuration change control
  • D. Security impact analysis
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Soleandheel
11 months, 1 week ago
D. Security impact analysis Security impact analysis is the process that is best used to determine the extent to which modifications to an information system affect the security posture of the system. It involves assessing the potential security impacts of changes, updates, or modifications to the system to ensure that security is maintained or improved.
upvoted 1 times
...
HughJassole
1 year, 5 months ago
D. https://csrc.nist.gov/glossary/term/security_impact_analysis
upvoted 1 times
...
aleXplicitly
1 year, 7 months ago
Selected Answer: D
Voting for D
upvoted 2 times
jackdryan
1 year, 6 months ago
D is correct
upvoted 1 times
...
...
aleXplicitly
1 year, 7 months ago
After a change/modification, security impact analysis is conducted to verify the security posture has not regressed.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...