Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 222 discussion

Actual exam question from ISC's CISSP
Question #: 222
Topic #: 1
[All CISSP Questions]

An organization contracts with a consultant to perform a System Organization Control (SOC) 2 audit on their internal security controls. An auditor documents a finding a related to an Application Programming Interface (API) performing an action that is not aligned with the scope or objective of the system. Which trust service principle would be MOST applicable in th is situation?

  • A. Confidentiality
  • B. Processing Integrity
  • C. Security
  • D. Availability
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
brb77
Highly Voted 2 years, 1 month ago
it could query and get unauthorized data compromising confidentiality. could flood and crash the API. could write garbage compromising integrity. all possible because query integrity was not enforced. it s B.
upvoted 6 times
...
homeysl
Most Recent 8 months, 1 week ago
Selected Answer: B
Look it up
upvoted 1 times
...
gjimenezf
10 months, 1 week ago
Selected Answer: B
One key component of Procesing Integrity is: Authorization: Confirming that processing activities are authorized and align with the organization's objectives and policies.
upvoted 1 times
...
gjimenezf
10 months, 1 week ago
Selected Answer: C
In the context of a System Organization Control (SOC) 2 audit, the trust service principles include Security, Availability, Processing Integrity, Confidentiality, and Privacy. Among these principles, the one MOST applicable in a situation where an Application Programming Interface (API) is performing an action not aligned with the scope or objective of the system is: C. Security The Security principle in SOC 2 encompasses controls related to the protection of system resources against unauthorized access (both physical and logical). If an API is performing actions outside the defined scope or objectives, it could be a security-related concern, as it might involve unauthorized access or actions that compromise the security of the system. Addressing such findings is crucial to ensure that the system's security controls align with the specified criteria and objectives.
upvoted 1 times
...
629f731
10 months, 2 weeks ago
Selected Answer: C
The Security trust service principle within the SOC 2 framework encompasses the protection of information and systems against unauthorized access (both physical and logical). It includes the policies, processes, and controls designed to safeguard the confidentiality, integrity, and availability of the system.
upvoted 1 times
...
maawar83
11 months ago
I think the principal is D.. Processing Integrity is not a service principal
upvoted 1 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: C
While the finding related to an API performing an action that is not aligned with the scope or objective of the system might also indicate a processing integrity issue, the control objective of processing integrity is to ensure that system processing is complete, accurate, timely, and authorized. This means that processing integrity is more concerned with the accuracy and completeness of the data processing rather than the security of the system. In this case, the finding indicates a security issue because the API is performing an action that is not aligned with the scope or objective of the system. This means that the system is not secure and that unauthorized actions are being performed, which is a violation of the security principle. Therefore, the most applicable trust service principle in this situation is "Security."
upvoted 1 times
...
Delab202
1 year, 11 months ago
API performing an action that is not aligned with the scope or objective of the system? Processing Integrity-Answer Integrity-Data and system are protected from intentional, unauthorized, or accidental changes. Answer: B
upvoted 1 times
jackdryan
1 year, 6 months ago
B is correct
upvoted 1 times
...
...
dirtmcderp
1 year, 11 months ago
Answer is D. "Availability. Information and systems are available for operation and use to meet the entity’s objectives." The actions DON'T follow the business scope. So this would, keyword" MOST" be applicable to availability. It can't be processing integrity because processing integrity is more-so about the accuracy of the data. "Processing integrity. System processing is complete, valid, accurate, timely, and authorized to meet the entity’s objectives." https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/trustdataintegritytaskforce
upvoted 1 times
...
sphenixfire
1 year, 11 months ago
Selected Answer: B
https://www.vistainfosec.com/blog/choosing-soc-2-principles/
upvoted 2 times
...
Jamati
2 years ago
Selected Answer: B
Processing integrity
upvoted 2 times
...
BDSec
2 years, 2 months ago
Selected Answer: B
Processing integrity. System processing is complete, valid, accurate, timely, and authorized to meet the entity’s objectives.
upvoted 3 times
...
wojpx
2 years, 2 months ago
Selected Answer: A
I think that that way it is impacting A
upvoted 2 times
...
DERCHEF2009
2 years, 2 months ago
Really B?
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...