List of questions
Related questions
Question 345 - CISSP discussion
Changes to a Trusted Computing Base (TCB) system that could impact the security posture of that system and trigger a recertification activity are documented in the
A.
security impact analysis.
B.
structured code review.
C.
routine self assessment.
D.
cost benefit analysis.
Your answer:
0 comments
Sorted by
Leave a comment first