(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Configuration Management primarily focuses on:

  1. Physical Security

  2. Risk Identification

  3. Asset Tracking

  4. Change Implementation

The correct answer is: Asset Tracking

Configuration Management primarily focuses on Asset Tracking. This process involves maintaining information about the configuration of systems, including hardware and software components, which is crucial for ensuring that all assets are accounted for and managed effectively. By keeping detailed records of the configuration items, organizations can better understand their environment, facilitate audits, and ensure compliance with policies and regulations. In the context of cybersecurity, effective asset tracking helps identify vulnerabilities and assess the security posture of the organization. By knowing what assets are in place, security teams can implement appropriate security controls and ensure that they are updated and patched as necessary. Furthermore, having an accurate asset inventory aids in incident response, allowing quick identification of affected systems during a breach or security incident. The other choices relate to different aspects of security and management. Physical Security focuses on the protection of physical assets, such as buildings and personnel. Risk Identification deals with the process of recognizing threats and vulnerabilities that could exploit the organization's assets. Change Implementation refers to the management of changes in the environment, ensuring that modifications to systems are made in a controlled and responsible manner to prevent disruptions and risks. While these concepts are important, they fall outside the primary focus of Configuration Management, which centers on the assets themselves and how they are tracked and maintained.