CERTIFIED-IN-CYBERSECURITY · Question #200
CERTIFIED-IN-CYBERSECURITY Question #200: Real Exam Question with Answer & Explanation
The correct answer is D: Procedures. Procedures provide specific step-by-step instructions to achieve a task or process within a cybersecurity framework (see ISC2 Study Guide, Module 4, under Governance Elements). Procedures are detailed and help ensure consistency in the implementation of security measures. For ins
Question
Which of the following documents outlines the specific step-by-step instructions to achieve a task or process?
Options
- AStandards
- BPolicies
- CRegulations
- DProcedures
Explanation
Procedures provide specific step-by-step instructions to achieve a task or process within a cybersecurity framework (see ISC2 Study Guide, Module 4, under Governance Elements). Procedures are detailed and help ensure consistency in the implementation of security measures. For instance, a procedure might detail the steps an IT administrator should take when an employee reports a potential phishing email. This procedure could include steps like advising the employee not to click on any links or download attachments, preserving the email as evidence, reporting the incident to the cybersecurity team, and communicating with other staff members about the threat. Policies are high-level statements that provide guidance on how to achieve a desired outcome, but they do not offer the specific step-by-step instructions needed to accomplish a task or process. Similarly to policies, regulations are laws that must be followed but do not provide the specific step-by-step instructions needed to achieve a task or process. Standards are guidelines that provide a set of criteria to be met, but they do not offer the specific step-by-step instructions needed to achieve a task or process.
Topics
Community Discussion
No community discussion yet for this question.