Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSEP Topic 3 Question 90 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 90
Topic #: 3
[All ISSEP Questions]

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, C

Contribute your Thoughts:

Charolette
5 months ago
I'm just here for the free coffee and donuts. As long as it passes the smell test, I'm good with it.
upvoted 0 times
Joseph
3 months ago
D) Change and Configuration Control
upvoted 0 times
...
Derrick
3 months ago
C) Vulnerability Assessment and Penetration Testing
upvoted 0 times
...
Tamie
4 months ago
B) Security Certification and Accreditation (C&A)
upvoted 0 times
...
Dorethea
4 months ago
A) Risk Adjustments
upvoted 0 times
...
Marion
4 months ago
D) Change and Configuration Control
upvoted 0 times
...
Vernell
4 months ago
C) Vulnerability Assessment and Penetration Testing
upvoted 0 times
...
Lorrie
4 months ago
B) Security Certification and Accreditation (C&A)
upvoted 0 times
...
Cassi
4 months ago
A) Risk Adjustments
upvoted 0 times
...
...
Hannah
5 months ago
Yes, that's a good point. We need to make sure that the software is secure and stable before deployment.
upvoted 0 times
...
Shantay
5 months ago
I also think Change and Configuration Control is important to ensure that only authorized changes are made during deployment.
upvoted 0 times
...
Dion
5 months ago
All of the above! You can never be too secure, especially when it comes to software deployment. Might as well cover all the bases.
upvoted 0 times
Justine
4 months ago
I think we should definitely use all of the security controls mentioned for the deployment phase.
upvoted 0 times
...
Jennifer
4 months ago
I agree, it's better to be safe than sorry.
upvoted 0 times
...
...
Edda
5 months ago
I agree with Hannah. It's important to identify and fix any vulnerabilities before deploying the software.
upvoted 0 times
...
Evan
5 months ago
Haha, risk adjustments? That's like putting a band-aid on a bullet wound. C and D are the real deal.
upvoted 0 times
Alonzo
5 months ago
D) Change and Configuration Control
upvoted 0 times
...
Thurman
5 months ago
C) Vulnerability Assessment and Penetration Testing
upvoted 0 times
...
...
Rolande
6 months ago
B and C are the way to go. Security certification and penetration testing are crucial to ensuring the software is secure before deployment.
upvoted 0 times
...
Floyd
6 months ago
I think C and D are the best options for the deployment phase. Gotta make sure those vulnerabilities are identified and changes are properly controlled.
upvoted 0 times
Francis
5 months ago
Change and configuration control is also important to ensure that any changes made are properly managed.
upvoted 0 times
...
Antonette
5 months ago
I agree, vulnerability assessment and penetration testing are crucial for identifying weaknesses.
upvoted 0 times
...
...
Hannah
6 months ago
I think we should use Vulnerability Assessment and Penetration Testing for the deployment phase.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77