New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 4 Question 2 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 2
Topic #: 4
[All CSSLP Questions]

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project

manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid

configuration management activities except for which one?

Show Suggested Answer Hide Answer
Suggested Answer: D

Configuration item cost is not a valid activity for configuration management. Cost changes are managed by the cost change control system;

configuration management is concerned with changes to the features and functions of the project deliverables.


Contribute your Thoughts:

0/2000 characters
Erick
4 months ago
Configuration Verification and Auditing is super important, though!
upvoted 0 times
...
Lynda
4 months ago
Wait, is costing really not part of configuration management?
upvoted 0 times
...
Rosendo
4 months ago
Totally agree, D seems off.
upvoted 0 times
...
Brandee
4 months ago
I think Configuration Item Costing is the odd one out here.
upvoted 0 times
...
Leeann
5 months ago
Configuration Identification is definitely a key activity.
upvoted 0 times
...
Alline
5 months ago
I’m a bit confused; I thought all those activities were related to managing changes, but costing feels like it’s more about budgeting.
upvoted 0 times
...
Roosevelt
5 months ago
I practiced a similar question, and I feel like configuration item costing doesn't fit with the others.
upvoted 0 times
...
Emilio
5 months ago
I think configuration identification and verification are definitely key activities, but costing seems off.
upvoted 0 times
...
Melissa
5 months ago
I remember that configuration management is all about tracking changes, but I'm not sure if costing is really part of that.
upvoted 0 times
...
Dallas
5 months ago
Okay, the organization has a mature security policy and has taken steps to protect PI, but hasn't fully integrated it into all their processes yet. I think this could be a minor non-conformity.
upvoted 0 times
...
Noe
5 months ago
I'm a bit confused on this one. I know there's a global variable that stores the current file path, but I can't remember if it's _filename or _dirname. I'll have to think this through carefully.
upvoted 0 times
...
Flo
5 months ago
Hmm, I'm a bit confused by the different VRFs and routing protocols mentioned in the question. I'll need to review my notes on MPLS VPNs to make sure I understand the concepts before attempting to answer.
upvoted 0 times
...

Save Cancel