{"id":3547,"date":"2023-12-03T18:53:55","date_gmt":"2023-12-03T18:53:55","guid":{"rendered":"https:\/\/exampracticetests.com\/c\/SY0-601\/comptia-security-sy0-601-question321\/"},"modified":"2023-12-03T18:53:55","modified_gmt":"2023-12-03T18:53:55","slug":"comptia-security-sy0-601-question321","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/c\/SY0-601\/comptia-security-sy0-601-question321\/","title":{"rendered":"CompTIA Security+ SY0-601 &#8211; Question321"},"content":{"rendered":"<div class=\"question\">A Chief Information Security Officer (CISO) is evaluating the dangers involved in deploying a new ERP system<br \/>\nfor the company. The CISO categorizes the system, selects the controls that apply to the system, implements<br \/>\nthe controls, and then assesses the success of the controls before authorizing the system. Which of the<br \/>\nfollowing is the CISO using to evaluate the environment for this new ERP system?<br \/>\n<br \/><strong><br \/>A.<\/strong> The Diamond Model of Intrusion Analysis<br \/><strong>B.<\/strong> CIS Critical Security Controls<br \/><strong>C.<\/strong> NIST Risk Management Framework<br \/><strong>D.<\/strong> ISO 27002<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>C<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nReference: <a href=\"https:\/\/www.bmc.com\/blogs\/ciso-chief-information-security-officer\/\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/www.bmc.com\/blogs\/ciso-chief-information-security-officer\/<\/a><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>A Chief Information Security Officer (CISO) is evaluating the dangers involved in deploying a new ERP system for the company. The CISO categorizes the system, selects the controls that apply to the system, implements the controls, and then assesses the success of the controls before authorizing the system. Which of the following is the CISO [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,324],"class_list":["post-3547","post","type-post","status-publish","format-standard","hentry","category-comptia-security-sy0-601","tag-comptia-security-sy0-601","tag-question-321"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts\/3547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/comments?post=3547"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts\/3547\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/media?parent=3547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/categories?post=3547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/tags?post=3547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}