Configuration Management controls what?
A . Auditing of changes to the Trusted Computing Base
B . Control of changes to the Trusted Computing Base
C . Changes in the configuration access to the Trusted Computing Base
D . Auditing and controlling any changes to the Trusted Computing Base
Answer: D
Latest CISSP Dumps Valid Version with 981 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund