Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSEP Topic 2 Question 92 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 92
Topic #: 2
[All ISSEP Questions]

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, C

Contribute your Thoughts:

Dottie
4 months ago
All of the above, because you can never be too secure, am I right?
upvoted 0 times
...
Lorrine
4 months ago
Haha, 'security' and 'deployment' in the same sentence? Good luck with that!
upvoted 0 times
Leatha
3 months ago
Haha, 'security' and 'deployment' in the same sentence? Good luck with that!
upvoted 0 times
...
Rikki
3 months ago
D) Change and Configuration Control
upvoted 0 times
...
Clement
3 months ago
C) Vulnerability Assessment and Penetration Testing
upvoted 0 times
...
Ira
3 months ago
A) Risk Adjustments
upvoted 0 times
...
...
Carol
4 months ago
B is crucial too - can't deploy anything without the seal of approval!
upvoted 0 times
Stephaine
3 months ago
B) Security Certification and Accreditation (C&A)
upvoted 0 times
...
Lai
4 months ago
A) Risk Adjustments
upvoted 0 times
...
...
Tennie
5 months ago
C and D for sure! Gotta assess those vulnerabilities and keep a tight grip on changes.
upvoted 0 times
Salome
4 months ago
It's all about staying proactive and staying on top of any potential risks.
upvoted 0 times
...
Glen
4 months ago
Penetration testing is also important to identify any weaknesses in the system.
upvoted 0 times
...
Tatum
4 months ago
I agree, vulnerability assessment and configuration control are crucial for security.
upvoted 0 times
...
...
Avery
5 months ago
Yes, Thad, I agree. Proper change and configuration control can help prevent unauthorized changes that could compromise security.
upvoted 0 times
...
Thad
5 months ago
I also think Change and Configuration Control is crucial for ensuring the security of the software during deployment.
upvoted 0 times
...
Ashton
5 months ago
I agree with Avery. It's important to identify and address any vulnerabilities before deploying the software.
upvoted 0 times
...
Avery
5 months ago
I think we should use Vulnerability Assessment and Penetration Testing for the deployment phase.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77