New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSEP Exam - Topic 4 Question 87 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 87
Topic #: 4
[All ISSEP Questions]

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, C

Contribute your Thoughts:

0/2000 characters
Kerrie
3 months ago
Wait, are we really using Risk Adjustments in deployment? Sounds odd.
upvoted 0 times
...
Suzan
3 months ago
I agree, C&A is crucial for compliance!
upvoted 0 times
...
Billye
3 months ago
Risk Adjustments? Not sure if that's really relevant here.
upvoted 0 times
...
Nelida
4 months ago
I think Change and Configuration Control is a must too.
upvoted 0 times
...
Glenn
4 months ago
Definitely going with Vulnerability Assessment and Penetration Testing!
upvoted 0 times
...
Tasia
4 months ago
Risk Adjustments sounds familiar, but I can't recall if it's specifically for the deployment phase. I feel like it might be more about ongoing risk management.
upvoted 0 times
...
Jesusita
4 months ago
Change and Configuration Control definitely rings a bell. I think we practiced a question about it being crucial for maintaining security post-deployment.
upvoted 0 times
...
Fatima
4 months ago
I'm not entirely sure about Security Certification and Accreditation. I think it might be more relevant in earlier phases, but I could be wrong.
upvoted 0 times
...
Effie
5 months ago
I remember we discussed the importance of Vulnerability Assessment and Penetration Testing during the deployment phase. It seems like a solid choice.
upvoted 0 times
...
Tish
5 months ago
I feel pretty confident about this one. The key is to select the security controls that are most relevant to the deployment phase, like vulnerability assessments, configuration management, and certification/accreditation. I'll go with B, C, and D.
upvoted 0 times
...
Cordie
5 months ago
Okay, I've got a strategy here. For deployment, I'll want to focus on controls that ensure the secure configuration and ongoing monitoring of the system. I think C and D are good options to start with.
upvoted 0 times
...
Valentin
5 months ago
Hmm, I'm a bit unsure about this one. The options seem to cover a range of security controls, but I'm not totally clear on how they specifically apply to the deployment phase. I'll need to think it through carefully.
upvoted 0 times
...
Myra
5 months ago
This looks like a straightforward security controls question. I'll start by thinking through the deployment phase of the SDLC and the key security considerations there.
upvoted 0 times
...
Jacquelyne
5 months ago
Okay, I've got this! The default Distribution mode is User. I remember learning that in the last module, so I'm confident that's the right answer.
upvoted 0 times
...
Anissa
5 months ago
Ah, this is a good one. I remember learning about PolarDB in class, so I should be able to provide a solid answer highlighting its benefits.
upvoted 0 times
...
Sheldon
5 months ago
This question seems straightforward, I think the answer is A - Publicly available.
upvoted 0 times
...
Glynda
5 months ago
This is a good one. I'm feeling pretty confident I can work through the logic and eliminate the incorrect options to find the right answer.
upvoted 0 times
...
Lamonica
2 years ago
I'm feeling a strong vibe from option C. Penetration testing, baby! Gotta hack the system before the bad guys do, am I right?
upvoted 0 times
...
Lettie
2 years ago
I'm torn between B, C, and D. Decisions, decisions. Maybe I should just ask the IT guy to decide for me. He's probably done this before, right?
upvoted 0 times
...
Trina
2 years ago
A, B, and C seem like the best options to me. Gotta cover all the bases, you know? Can't be too careful with security these days.
upvoted 0 times
Theola
2 years ago
Absolutely, can't take any chances when it comes to security. Change and configuration control is also key in the deployment phase.
upvoted 0 times
...
Maybelle
2 years ago
I agree, covering all bases with risk adjustments, security certification, and vulnerability assessment is crucial for security.
upvoted 0 times
...
Jimmie
2 years ago
A, B, and C are definitely important for ensuring secure software. It's better to be safe than sorry.
upvoted 0 times
...
...
Susana
2 years ago
D is a must-have! Change and configuration control is essential to maintain the integrity of the deployed system.
upvoted 0 times
Emile
2 years ago
D) Change and Configuration Control
upvoted 0 times
...
Helga
2 years ago
C) Vulnerability Assessment and Penetration Testing
upvoted 0 times
...
Danica
2 years ago
A) Risk Adjustments
upvoted 0 times
...
...
Iraida
2 years ago
I'd go with B and C. Security certification and accreditation, and vulnerability assessment are crucial during deployment to ensure the software is secure before release.
upvoted 0 times
Rodolfo
2 years ago
I think D is also important to ensure that any changes made are controlled and secure.
upvoted 0 times
...
Valentin
2 years ago
I think D is also important for controlling changes and configurations.
upvoted 0 times
...
Valentin
2 years ago
I agree, those are important steps to take during deployment.
upvoted 0 times
...
Wade
2 years ago
I think D is also important for controlling changes and configurations during deployment.
upvoted 0 times
...
Wade
2 years ago
I agree, B and C are essential for ensuring the security of the software during deployment.
upvoted 0 times
...
...

Save Cancel