Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 223 discussion

Actual exam question from ISC's CISSP
Question #: 223
Topic #: 1
[All CISSP Questions]

In which process MUST security be considered during the acquisition of new software?

  • A. Request for proposal (RFP)
  • B. Implementation
  • C. Vendor selection
  • D. Contract negotiation
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
homeysl
8 months, 1 week ago
Selected Answer: A
Tough one. My initial answer is A but then I worked on SAQ/SIG which is part vendor management. Then found a solid article linking RFP and security which mentions regulations like HIPAA & GDPR.
upvoted 1 times
...
hoho2000
8 months, 3 weeks ago
Selected Answer: A
-Creating and issuing the solicitation or request for proposal (RFP) with a SOW, instructions to potential respondents of RFP and terms and conditions, including conditions for acceptance, prequalification considerations and certifications. -Evaluating supplier proposals submitted in response to the solicitation or RFP. -Finalizing contract negotiation to include changes in terms and conditions and awarding the contract. Software risks should be addressed and mitigated through terms and conditions, certifications, evaluation factors for award and risk mitigation requirements in the SOW.
upvoted 1 times
...
JBAnalyst
9 months ago
Selected Answer: A
Security must be included from the beginning. C is a part of A…
upvoted 2 times
...
wins34
9 months, 1 week ago
Selected Answer: C
oth options A and C are correct. However, if we have to choose the process where security considerations are MUST be considered, it's the Vendor selection process (option C), as it directly pertains to selecting the software provider based on their security capabilities and track record.
upvoted 1 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: C
Vendor selection criteria can certainly be specified in the RFP. In fact, the RFP process is often used to help organizations identify potential vendors and evaluate their offerings based on a variety of criteria, including security. However, the RFP process is not the process in which security must be considered. While security should be an important consideration during the RFP process, it is not the only or even the most important factor in the decision-making process. The vendor selection process, on the other hand, is specifically focused on evaluating potential vendors based on their security measures, among other criteria. This process typically involves a more detailed evaluation of the vendor's security policies, procedures, and past security incidents, as well as other factors such as cost, functionality, and vendor qualifications. Overall, while vendor selection criteria can certainly be specified in the RFP, it is during the vendor selection process that security must be considered in a more detailed and thorough manner.
upvoted 2 times
...
RVoigt
1 year, 9 months ago
Selected Answer: C
The question doesn't define that the software is being created, it could be COTS. In the CISSP Student Guide - "Systems, product and even retailer or wholesaler selection are still decisions that can and should be influenced by security considerations. Exploit the CVE data that is available, both for the products under consideration and for other products made by the same vendor; research the vendors’ reputations for responding to vulnerability reports, their responsiveness in issuing timely security updates, and their use of signed software update packages to distribute those updates. The same due care you would use to keep such a system safely operating once you had installed it can and should be used as due diligence on it before you endorse the decision to buy, lease, or license it for use."
upvoted 2 times
jackdryan
1 year, 6 months ago
A is correct
upvoted 1 times
...
...
rajkamal0
1 year, 11 months ago
Selected Answer: A
RFP is the best answer
upvoted 2 times
...
rdy4u
2 years ago
Selected Answer: A
RFI->RFP->Vendor Selection. So, requirement for security must be considered in RFI/RFP
upvoted 4 times
...
Toyeeb
2 years, 1 month ago
can anyone explain why this is A, it should be C instead.
upvoted 1 times
oudmaster
1 year, 11 months ago
because you release the RFP before you select the vendor. And in the RFP you should include your security specifications.
upvoted 4 times
...
franbarpro
2 years, 1 month ago
I think C is part of A. Bcs: A Request for Proposal (RFP) is a business document posted publicly to announce new projects, ask for bids and give out project details to interested parties, vendors or companies. Government agencies and companies use an RFP to explain the scope and goals of projects, create a list of all the necessary requirements, describe evaluation criteria, explain the contract terms and outline bidding processes.
upvoted 3 times
...
Humongous1593
2 years ago
Security must be brought into the process as soon as possible. That means during the most initial phase of the 4 answers provided. In this case, going out for RFP is the first step. Security should have been brought in the second someone said "I need a new system" (but thats not a choice here). You are not going to choose a vendor until you review proposals sent in response to RFP.
upvoted 4 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...