Page 1180 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1180
D. Grant access to only trusted employees.
9. Which of the following identifies vendor responsibilities and can
include monetary penalties if the vendor doesn’t meet the stated
responsibilities?
A. Service-level agreement (SLA)
B. Memorandum of understanding (MOU)
C. Interconnection security agreement (ISA)
D. Software as a service (SaaS)
10. What should be done with equipment that is at the end of its
lifecycle and is being donated to a charity?
A. Remove all CDs and DVDs.
B. Remove all software licenses.
C. Sanitize it.
D. Install the original software.
11. An organization is planning the layout of a new building that will
house a datacenter. Where is the most appropriate place to locate
the datacenter?
A. In the center of the building
B. Closest to the outside wall where power enters the building
C. Closest to the outside wall where heating, ventilation, and air
conditioning systems are located
D. At the back of the building
12. Which of the following is a true statement regarding virtual
machines (VMs) running as guest operating systems on physical
servers?
A. Updating the physical server automatically updates the VMs.
B. Updating any VM automatically updates all the VMs.
C. VMs do not need to be updated if the physical server is updated.

