{"id":333,"date":"2021-01-11T09:41:25","date_gmt":"2021-01-11T09:41:25","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/CCSP\/certified-cloud-security-professional-ccsp-question326\/"},"modified":"2021-01-11T09:41:25","modified_gmt":"2021-01-11T09:41:25","slug":"certified-cloud-security-professional-ccsp-question326","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/CCSP\/certified-cloud-security-professional-ccsp-question326\/","title":{"rendered":"Certified Cloud Security Professional &#8211; CCSP &#8211; Question326"},"content":{"rendered":"<div class=\"question\">As part of the auditing process, getting a report on the deviations between intended configurations and actual policy is often crucial for an organization.<br \/>\nWhat term pertains to the process of generating such a report? <br \/><strong><br \/>A.<\/strong> Deficiencies <br \/><strong>B.<\/strong> Findings <br \/><strong>C.<\/strong> Gap analysis <br \/><strong>D.<\/strong> Errors<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>C<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nExplanation: The gap analysis determines if there are any differences between the actual configurations in use on systems and the policies that govern what the configurations are expected or mandated to be. The other terms provided are all similar to the correct answer (&#8220;findings&#8221; in particular is often used to articulate deviations in configurations), but gap analysis is the official term used.<\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>As part of the auditing process, getting a report on the deviations between intended configurations and actual policy is often crucial for an organization. What term pertains to the process of generating such a report? A. Deficiencies B. Findings C. Gap analysis D. Errors Show Answer Hide Answer Correct Answer: C Explanation: Explanation: The gap [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,329],"class_list":["post-333","post","type-post","status-publish","format-standard","hentry","category-certified-cloud-security-professional-ccsp","tag-certified-cloud-security-professional-ccsp","tag-question-326"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts\/333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/comments?post=333"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts\/333\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/media?parent=333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/categories?post=333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/tags?post=333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}