nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #319

CERTIFIED-IN-CYBERSECURITY Question #319: Real Exam Question with Answer & Explanation

The correct answer is D: Procedures. Procedures are typically the most detailed documents in cybersecurity, providing the granular steps required to implement a specific security measure or process. They ensure consistency and help reduce the likelihood of errors in the execution of security tasks (ISC2 Study Guide,

Security Principles

Question

In an organization, which document provides step-by-step guidance in implementing a security measure?

Options

  • AStandards
  • BPolicies
  • CRegulations
  • DProcedures

Explanation

Procedures are typically the most detailed documents in cybersecurity, providing the granular steps required to implement a specific security measure or process. They ensure consistency and help reduce the likelihood of errors in the execution of security tasks (ISC2 Study Guide, Module 4, under Governance Elements). The remaining options are not typically the most detailed documents in the context of cybersecurity and do not provide the granular steps required to implement a specific security measure or process. Policies provide guidance and direction for the organization's security efforts, considering its specific requirements and risk tolerance. Regulations are external documents that are driven by industry requirements or government regulations. Standards provide a common set of best practices, guidelines, or requirements that can be applied across organizations within an industry.

Topics

#Security Documentation#Procedures#Security Governance#Implementation Guidance

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions