Page 1554 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1554

Removing software licenses or installing the original software is
                    not necessarily required unless the organization’s sanitization

                    process requires it.

               11.  A. Valuable assets require multiple layers of physical security, and
                    placing a datacenter in the center of the building helps provide
                    these additional layers. Placing valuable assets next to an outside
                    wall (including at the back of the building) eliminates some layers
                    of security.

               12.  D. VMs need to be updated individually just as they would be if
                    they were running on a physical server. Updates to the physical

                    server do not update hosted VMs. Similarly, updating one VM
                    doesn’t update all VMs.

               13.  A. Organizations have the most responsibility for maintenance and
                    security when leasing infrastructure as a service (IaaS) cloud
                    resources. The cloud service provider takes more responsibility
                    with the platform as a service (PaaS) model and the most

                    responsibility with the software as a service (SaaS) model. Hybrid
                    refers to a cloud deployment model (not a service model) and
                    indicates that two or more deployment models are used (such as
                    private, public, and/or community.

               14.  C. A community cloud deployment model provides cloud-based
                    assets to two or more organizations. A public cloud model includes
                    assets available for any consumers to rent or lease. A private cloud

                    deployment model includes cloud-based assets that are exclusive to
                    a single organization. A hybrid model includes a combination of
                    two or more deployment models. It doesn’t matter if it is a software
                    as a service (SaaS) model or any other service model.

               15.  B. The tapes should be purged, ensuring that data cannot be
                    recovered using any known means. Even though tapes may be at
                    the end of their lifecycle, they can still hold data and should be

                    purged before throwing them away. Erasing doesn’t remove all
                    usable data from media, but purging does. There is no need to store
                    the tapes if they are at the end of their lifecycle.

               16.  B. Images can be an effective configuration management method
   1549   1550   1551   1552   1553   1554   1555   1556   1557   1558   1559