In addition to ensuring that changes to the computer system take place in an identifiable and controlled environment, configuration management provides assurance that future changes:
A . The application software cannot bypass system security features.
B . Do not adversely affect implementation of the security policy.
C . To do the operating system are always subjected to independent validation and verification.
D . In technical documentation maintain an accurate description of the Trusted Computer Base.
Answer: B
Latest CISSP Dumps Valid Version with 981 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund