CERTIFIED-IN-CYBERSECURITY · Question #785
CERTIFIED-IN-CYBERSECURITY Question #785: Real Exam Question with Answer & Explanation
The correct answer is A: Audit logs. System Security Configuration Management elements are inventories, baselines, updates and patches. Audit logs can be generated after 'Verification and Audit'. However, 'Verification and Audit' is a configuration management procedure, and not a configuration management element (se
Question
Which of the following is NOT an element of System Security Configuration Management?
Options
- AAudit logs
- BBaselines
- CUpdates
- DInventory
Explanation
System Security Configuration Management elements are inventories, baselines, updates and patches. Audit logs can be generated after 'Verification and Audit'. However, 'Verification and Audit' is a configuration management procedure, and not a configuration management element (see ISC2 Study Guide, chapter 5, module 2, under Chapter Resource).
Topics
Community Discussion
No community discussion yet for this question.