nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #785

CERTIFIED-IN-CYBERSECURITY Question #785: Real Exam Question with Answer & Explanation

The correct answer is A: Audit logs. System Security Configuration Management elements are inventories, baselines, updates and patches. Audit logs can be generated after 'Verification and Audit'. However, 'Verification and Audit' is a configuration management procedure, and not a configuration management element (se

Secure Systems Principles

Question

Which of the following is NOT an element of System Security Configuration Management?

Options

  • AAudit logs
  • BBaselines
  • CUpdates
  • DInventory

Explanation

System Security Configuration Management elements are inventories, baselines, updates and patches. Audit logs can be generated after 'Verification and Audit'. However, 'Verification and Audit' is a configuration management procedure, and not a configuration management element (see ISC2 Study Guide, chapter 5, module 2, under Chapter Resource).

Topics

#Configuration Management#System Security#Security Controls#Baselines

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions