Which of the following should be measured and analyzed regularly when implementing the Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers CIS Control?
This question seems straightforward, but I want to make sure I have the right approach. I'll start by identifying the elementary processes, then classify the transactional functions, and work my way through the rest of the steps.
Okay, I think I've got this. Based on the details provided, the answer has to be WS-PolicyAttachment. That standard allows you to attach a shared security policy to multiple web service contracts.
Hmm, I'm a bit unsure about this one. There are a few different things the entry script could be responsible for, like setting up the environment and registering the model. I'll need to think through the details of the deployment process to make sure I select the right option.
Ah, I see what they're getting at now. Black-box testing is the way to go here, as we're evaluating the system's functionality from the user's perspective without needing to know the internal implementation details. Nice, I feel confident about this one.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Carlota
4 months agoCasandra
4 months agoDolores
4 months agoTwana
4 months agoSoledad
5 months agoBasilia
5 months agoTruman
5 months agoSelma
5 months agoTamar
5 months agoCarrol
5 months agoMajor
5 months agoCristal
5 months agoNathan
5 months agoFrance
5 months ago