Register
11:54
Stop
CISSP - Security Operations - Security Configuration Management
Beginner
1/12
When performing a risk assessment of configuration changes, what is the most crucial factor to consider in terms of Security Configuration Management?
a.
Time taken for implementation
b.
Requirements for additional training
c.
Compatibility with existing workflows
d.
Impact on security posture
Beginner