Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 439 discussion

Actual exam question from ISC's CISSP
Question #: 439
Topic #: 1
[All CISSP Questions]

An organization acquired used technological equipment. This equipment will be integrated with new and existing business processes. What is the MOST appropriate consideration to identify the equipment that requires protection?

  • A. Total monetary value of the acquisition
  • B. The age of the computing hardware
  • C. Stakeholder concerns of how the assets are used
  • D. Length and extent of support by the vendor
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
JohnyDal
Highly Voted 1 year, 9 months ago
Selected Answer: D
yep, EOL and EOS are biggest concerns atm
upvoted 6 times
jackdryan
1 year, 6 months ago
D is correct
upvoted 1 times
...
...
yottabyte
Highly Voted 1 year, 9 months ago
Selected Answer: D
I would check if vendor will support patching. The equipment is already bought and stakeholders may have been part of the discussion in purchasing the used equipment. D makes logical sense to me.
upvoted 5 times
...
deeden
Most Recent 3 months, 1 week ago
Selected Answer: C
Option D limitations: Vendor support is important for maintaining the equipment, but it doesn't determine the level of protection needed. Even equipment with minimal vendor support might require significant protection if it plays a critical role in business processes.
upvoted 1 times
...
pete79
9 months, 2 weeks ago
Selected Answer: D
Board has made decision to buy used, stakeholders trust board and are aware of intention to save $$$, though all must work, therefore you care about how much longer you can have the gear supported
upvoted 1 times
...
GuardianAngel
9 months, 2 weeks ago
Answer: C Stakeholder concerns could range from data privacy and security to compliance with industry regulations. Identifying the equipment that requires protection involves understanding the specific needs and concerns of stakeholders. If customer data is processed or stored on the acquired equipment, it would need to be protected to ensure data privacy and compliance with data protection regulations such as encryption, access controls, and monitoring, to protect the equipment and the sensitive information it handles. The total monetary value of the acquisition does not necessarily correlate with the level of protection needed, as lower-value assets can still contain sensitive information. The age of the computing hardware is not the sole determinant of protection requirements, as even older equipment can store critical data. The length and extent of vendor support are important for maintenance and updates but that isn't comprehensive support.
upvoted 2 times
...
YesPlease
11 months ago
Selected Answer: C
Answer C) Stakeholder concerns of how the assets are used Just my 2 cents... The fact that the equipment is used is trying to throw you off the real question. (**I think I see a pattern with CISSP questions when they are three sentences long...these seem to want to throw you off the real question at the end**). The real question is asking you what you need to take into consideration in order to identify the equipment that needs to be protected most. Of all the answers, only one is not left up for interpretation/speculation. The Stakeholders concerns will tell you which equipment will need the most protection. Age and Value are wrong because they could be less than a year older than production and cost pennies on the dollar and just because they are not new doesn't mean that they are anywhere near the end of support.
upvoted 3 times
...
Soleandheel
11 months, 1 week ago
C. Stakeholder concerns of how the assets are used........The success of the business functions is always a priority and the stakeholders define that.
upvoted 3 times
...
Tygrond87
1 year, 6 months ago
Does not all risk managment start with knowing Asset value ?
upvoted 2 times
...
emrys
1 year, 8 months ago
Selected Answer: B
The age of the computing hardware is a key factor to consider because even if the vendor provides support for the equipment, older hardware may have outdated security features that cannot be updated. Additionally, newer hardware may have improved security features that older equipment may not have, even if it is still supported by the vendor.
upvoted 1 times
...
Rollingalx
1 year, 9 months ago
I go with D.
upvoted 2 times
...
l00t
1 year, 9 months ago
Selected Answer: C
The most appropriate consideration to identify the equipment that requires protection is C. Stakeholder concerns of how the assets are used. This is because the equipment may store or process sensitive information that needs to be protected from unauthorized access, disclosure, modification, or destruction. The stakeholder concerns may include the confidentiality, integrity, availability, and accountability of the information, as well as the compliance with legal, regulatory, or contractual obligations. The other considerations are less relevant or less specific to the protection of the equipment. For example, the total monetary value of the acquisition may not reflect the value of the information, the age of the computing hardware may not indicate the level of security or vulnerability, and the length and extent of support by the vendor may not address the risks or threats to the equipment.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...