Page 1554 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1554
Removing software licenses or installing the original software is
not necessarily required unless the organization’s sanitization
process requires it.
11. A. Valuable assets require multiple layers of physical security, and
placing a datacenter in the center of the building helps provide
these additional layers. Placing valuable assets next to an outside
wall (including at the back of the building) eliminates some layers
of security.
12. D. VMs need to be updated individually just as they would be if
they were running on a physical server. Updates to the physical
server do not update hosted VMs. Similarly, updating one VM
doesn’t update all VMs.
13. A. Organizations have the most responsibility for maintenance and
security when leasing infrastructure as a service (IaaS) cloud
resources. The cloud service provider takes more responsibility
with the platform as a service (PaaS) model and the most
responsibility with the software as a service (SaaS) model. Hybrid
refers to a cloud deployment model (not a service model) and
indicates that two or more deployment models are used (such as
private, public, and/or community.
14. C. A community cloud deployment model provides cloud-based
assets to two or more organizations. A public cloud model includes
assets available for any consumers to rent or lease. A private cloud
deployment model includes cloud-based assets that are exclusive to
a single organization. A hybrid model includes a combination of
two or more deployment models. It doesn’t matter if it is a software
as a service (SaaS) model or any other service model.
15. B. The tapes should be purged, ensuring that data cannot be
recovered using any known means. Even though tapes may be at
the end of their lifecycle, they can still hold data and should be
purged before throwing them away. Erasing doesn’t remove all
usable data from media, but purging does. There is no need to store
the tapes if they are at the end of their lifecycle.
16. B. Images can be an effective configuration management method

