(ISC)2(ISC)2
CSSLP · Question #377
CSSLP Question #377: Real Exam Question with Answer & Explanation
The correct answer is C: Preventing integrity breaches. Secure configuration management is most useful for preventing integrity breaches by ensuring systems and applications are configured securely and consistently.
Secure Software Deployment, Operations, Maintenance
Question
Secure configuration management (CM) is most useful for what?
Options
- ASprint planning
- BReviewing documentation
- CPreventing integrity breaches
- DSecuring data repositories
Explanation
Secure configuration management is most useful for preventing integrity breaches by ensuring systems and applications are configured securely and consistently.
Common mistakes.
- A. Sprint planning is a project management activity within agile development, not the primary purpose of secure configuration management.
- B. Reviewing documentation is a general process that supports many areas, but it's not the most direct or specific benefit of secure configuration management itself.
- D. Securing data repositories is a broader security goal, whereas secure configuration management is a specific control for ensuring the integrity and security posture of the systems accessing and hosting that data.
Concept tested. Purpose of secure configuration management
Topics
#Configuration Management#Integrity#Security Baselines
Community Discussion
No community discussion yet for this question.