Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSMP Topic 3 Question 71 Discussion

Actual exam question for ISC2's ISSMP exam
Question #: 71
Topic #: 3
[All ISSMP Questions]

Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.

Show Suggested Answer Hide Answer
Suggested Answer: B

Physical Configuration Audit (PCA) is one of the practices used in Software Configuration Management for Software Configuration Auditing. The purpose of the software PCA is to ensure that the design and reference documentation is consistent with the as-built software product. PCA checks and matches the really implemented layout with the documented layout.

Answer option D is incorrect. Functional Configuration Audit or FCA is one of the practices used in Software Configuration Management for Software Configuration Auditing. FCA occurs either at delivery or at the moment of effecting the change. A Functional Configuration Audit ensures that functional and performance attributes of a configuration item are achieved.

Answer option C is incorrect. Configuration control is a procedure of the Configuration management. Configuration control is a set of processes and approval stages required to change a configuration item's attributes and to re-baseline them. It supports the change of the functional and physical attributes of software at various points in time, and performs systematic control of changes to the identified attributes.

Answer option A is incorrect. Configuration identification is the process of identifying the attributes that define every aspect of a configuration item. A configuration item is a product (hardware and/or software) that has an end-user purpose. These attributes are recorded in configuration documentation and baselined. Baselining an attribute forces formal configuration change control processes to be effected in the event that these attributes are changed.


Contribute your Thoughts:

Cheryl
7 days ago
Vulnerability assessments are key to identifying weaknesses that could be exploited. And data classification helps you prioritize your security efforts.
upvoted 0 times
...
Devora
12 days ago
Definitely password policies, that's a must-have! But I'm not sure about data encryption - isn't that more for protecting data than social engineering?
upvoted 0 times
...
Evangelina
13 days ago
I believe vulnerability assessments are important too. They can help identify potential weaknesses that social engineers may exploit.
upvoted 0 times
...
Lynelle
16 days ago
I agree with Rory. Data encryption can also be effective in eliminating social engineering threats.
upvoted 0 times
...
Rory
18 days ago
I think password policies can help prevent social engineering attacks.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77