Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSEP Topic 4 Question 87 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 87
Topic #: 4
[All ISSEP Questions]

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, C

Contribute your Thoughts:

Lamonica
6 months ago
I'm feeling a strong vibe from option C. Penetration testing, baby! Gotta hack the system before the bad guys do, am I right?
upvoted 0 times
...
Lettie
6 months ago
I'm torn between B, C, and D. Decisions, decisions. Maybe I should just ask the IT guy to decide for me. He's probably done this before, right?
upvoted 0 times
...
Trina
6 months ago
A, B, and C seem like the best options to me. Gotta cover all the bases, you know? Can't be too careful with security these days.
upvoted 0 times
Theola
5 months ago
Absolutely, can't take any chances when it comes to security. Change and configuration control is also key in the deployment phase.
upvoted 0 times
...
Maybelle
5 months ago
I agree, covering all bases with risk adjustments, security certification, and vulnerability assessment is crucial for security.
upvoted 0 times
...
Jimmie
5 months ago
A, B, and C are definitely important for ensuring secure software. It's better to be safe than sorry.
upvoted 0 times
...
...
Susana
6 months ago
D is a must-have! Change and configuration control is essential to maintain the integrity of the deployed system.
upvoted 0 times
Emile
5 months ago
D) Change and Configuration Control
upvoted 0 times
...
Helga
5 months ago
C) Vulnerability Assessment and Penetration Testing
upvoted 0 times
...
Danica
6 months ago
A) Risk Adjustments
upvoted 0 times
...
...
Iraida
6 months ago
I'd go with B and C. Security certification and accreditation, and vulnerability assessment are crucial during deployment to ensure the software is secure before release.
upvoted 0 times
Rodolfo
5 months ago
I think D is also important to ensure that any changes made are controlled and secure.
upvoted 0 times
...
Valentin
5 months ago
I think D is also important for controlling changes and configurations.
upvoted 0 times
...
Valentin
5 months ago
I agree, those are important steps to take during deployment.
upvoted 0 times
...
Wade
6 months ago
I think D is also important for controlling changes and configurations during deployment.
upvoted 0 times
...
Wade
6 months ago
I agree, B and C are essential for ensuring the security of the software during deployment.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77