New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 2 Question 58 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 58
Topic #: 2
[All CISSP Questions]

Information Security Continuous Monitoring (1SCM) is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management

decisions. Which of the following is the FIRST step in developing an ISCM strategy and implementing an ISCM program?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Sylvie
4 months ago
C and D are more about response, not initial strategy.
upvoted 0 times
...
Lauran
4 months ago
Wait, are we sure A is right? Seems too broad to start with.
upvoted 0 times
...
Tammara
4 months ago
Totally agree with A, visibility is key!
upvoted 0 times
...
Nenita
4 months ago
I think B makes more sense. You need to know your threats first!
upvoted 0 times
...
Theresia
4 months ago
A is definitely the first step! Gotta define that strategy.
upvoted 0 times
...
Cammy
5 months ago
Analyzing data and reporting findings seems like something we do after we've established a strategy, so I don't think that's the first step.
upvoted 0 times
...
Teresita
5 months ago
I feel like responding to findings is more of a later step in the process, but I could see how some might think it’s part of the initial strategy.
upvoted 0 times
...
Brent
5 months ago
I remember a practice question that emphasized the importance of understanding vulnerabilities first, which makes me lean towards conducting a vulnerability assessment as the first step.
upvoted 0 times
...
Norah
5 months ago
I think the first step should be defining a strategy based on risk tolerance, but I'm not entirely sure if that's the very first thing we should do.
upvoted 0 times
...
Alona
5 months ago
Okay, let's see. I know that route reflectors are used to reduce the number of BGP peering sessions within an AS, and that clusters can be configured to further optimize this. I'll need to double-check the specifics on how the clusters interact.
upvoted 0 times
...
Shannon
5 months ago
I'm pretty confident the underlined text is incorrect. The right way to create a new group is to drag a tile to the far-right side of the Start screen and drop it there.
upvoted 0 times
...
Andrew
5 months ago
Hmm, I'm not sure about this one. I know there's an option to create recurring tasks, but I'm not sure if that's the right approach here. I might need to think this through a bit more.
upvoted 0 times
...
Mabel
5 months ago
Hmm, I'm not entirely sure about this one. I'll need to think it through carefully and review my notes on the WFM system architecture.
upvoted 0 times
...

Save Cancel