New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 6 Question 11 Discussion

Contribute your Thoughts:

0/2000 characters
Leota
4 months ago
Wait, are we sure all these are recommended?
upvoted 0 times
...
Mona
4 months ago
Totally agree with D, selecting controls is key!
upvoted 0 times
...
Ceola
4 months ago
C seems a bit off for change management.
upvoted 0 times
...
Susana
4 months ago
I think B is crucial too!
upvoted 0 times
...
King
5 months ago
A is definitely part of the process!
upvoted 0 times
...
Nieves
5 months ago
I’m a bit confused about the options. I thought selecting security controls was more of a preliminary step rather than part of the change management process itself.
upvoted 0 times
...
Buffy
5 months ago
I practiced a similar question where we had to identify steps in change management. I feel like "Build and test" is definitely a key part of that process.
upvoted 0 times
...
Royal
5 months ago
I think "Implement security controls" might be part of the process, but I also recall something about categorizing information systems being important too.
upvoted 0 times
...
Kristofer
5 months ago
I remember studying change management processes, but I'm not entirely sure which subsections are specifically recommended.
upvoted 0 times
...
Marcelle
5 months ago
I'm a bit confused by this question. Should I apologize for my lack of experience like in option C? Or is it better to just keep it simple and ask how I can help as in option D? I'm not sure which approach would be best for a first-time service desk call.
upvoted 0 times
...
Alonso
5 months ago
This is a tricky one. I know we've covered serverless security in class, but the specific details are escaping me at the moment. I think I'll eliminate the options that seem less relevant, and then make an educated guess between the remaining choices.
upvoted 0 times
...
Marshall
5 months ago
I'm a bit confused here. Do we need to obtain information security management approval first, or can we just focus on the integrity of the application? I'm not sure which approach is best.
upvoted 0 times
...

Save Cancel