Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSMP Topic 4 Question 74 Discussion

Actual exam question for ISC2's ISSMP exam
Question #: 74
Topic #: 4
[All ISSMP Questions]

Which of the following processes will you involve to perform the active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures?

Show Suggested Answer Hide Answer
Suggested Answer: C

Monitoring the computer hard disks or e-mails of employees pertains to the privacy policy of an organization.

Answer option B is incorrect. The backup policy of a company is related to the backup of its data.

Answer option A is incorrect. The network security policy is related to the security of a company's network.

Answer option D is incorrect. The user password policy is related to passwords that users provide to log on to the network.


Contribute your Thoughts:

Aja
18 days ago
Ah, the classic 'which one is the correct answer?' dilemma. I'm going to have to go with A) Penetration testing. Gotta love a good ethical hacking session, am I right?
upvoted 0 times
...
Douglass
22 days ago
I'm not sure, but I think risk analysis could also be a valid option to consider.
upvoted 0 times
...
Estrella
24 days ago
I agree with Van, penetration testing is the best way to actively analyze system vulnerabilities.
upvoted 0 times
...
Van
25 days ago
I think the answer is A) Penetration testing.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77