New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 HCISPP Exam - Topic 9 Question 107 Discussion

Actual exam question for ISC2's HCISPP exam
Question #: 107
Topic #: 9
[All HCISPP Questions]

A continuous information security monitoring program can BEST reduce risk through which of the following?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Minna
2 months ago
Wait, can a monitoring program really cover everything? Sounds too good to be true!
upvoted 0 times
...
Lanie
2 months ago
Logging changes (D) is good, but it feels more reactive than proactive.
upvoted 0 times
...
Sharita
3 months ago
I think C is crucial too, can't ignore the people and processes!
upvoted 0 times
...
Edward
3 months ago
B seems important, but I’m not sure it’s the best option here.
upvoted 0 times
...
Becky
3 months ago
A is definitely the best choice for spotting issues early.
upvoted 0 times
...
Arlene
3 months ago
I vaguely recall that logging changes is important for audits, but I’m not convinced that option D is the best way to reduce risk overall.
upvoted 0 times
...
Kenny
4 months ago
I feel like option C is the most comprehensive since it covers people, processes, and technology, but I’m not confident if it directly reduces risk.
upvoted 0 times
...
Yun
4 months ago
I remember a practice question where we discussed the importance of visibility into user accounts, so option B could also be a strong contender.
upvoted 0 times
...
Erinn
4 months ago
I think option A makes sense since identifying anomalies is crucial for spotting potential threats, but I'm not entirely sure if it's the best choice.
upvoted 0 times
...
Ozell
4 months ago
This is a tricky one. I feel like I know the concepts, but translating them to the specific wording of the question is challenging. I'm leaning towards option A, but I'm not 100% confident. Maybe I'll eliminate a couple options first before making my final decision.
upvoted 0 times
...
Lavelle
4 months ago
Okay, let me think this through. A continuous monitoring program needs to cover people, processes, and technology, so option C seems like a good choice. But I'm also wondering if option B about visibility into critical user accounts could be important too. I'll have to weigh the pros and cons of each.
upvoted 0 times
...
Arlene
4 months ago
Hmm, I'm a bit unsure about this one. I know continuous monitoring is important for reducing risk, but I'm not sure which of these options is the BEST approach. I might need to review my notes on the different components of a monitoring program.
upvoted 0 times
...
Hoa
5 months ago
This looks like a pretty straightforward question. I think the key is to focus on the term "continuous information security monitoring program" and what that entails. I'd go with option A - collecting security events and correlating them to identify anomalies.
upvoted 0 times
...
Gilma
5 months ago
That makes sense, Tayna. It's important to monitor both scheduled and unscheduled changes for security purposes.
upvoted 0 times
...
Tayna
5 months ago
I see your point, James. But I think the answer is D, because logging system changes can help track any unauthorized activities.
upvoted 0 times
...
James
6 months ago
I disagree, I believe the answer is C, because it involves all aspects of security - people, process, and technology.
upvoted 0 times
...
Lauryn
6 months ago
Option C sounds like the most comprehensive approach to me. Security is a holistic endeavor, not just a technical one.
upvoted 0 times
Odelia
5 months ago
A: I agree, option C covers all aspects of security.
upvoted 0 times
...
...
Gilma
6 months ago
I think the answer is A, because correlating security events can help identify anomalies.
upvoted 0 times
...

Save Cancel