ISC2 CISSP Exam
Certified Information Systems Security Professional (CISSP) (Page 12 )

Updated On: 15-Feb-2026

A corporation does not have a formal data destruction policy. During which phase of a criminal legal proceeding will this have the MOST impact?

  1. Sentencing
  2. Trial
  3. Discovery
  4. Arraignment

Answer(s): C



What is considered the BEST explanation when determining whether to provide remote network access to a third-party security service?

  1. Contract negotiation
  2. Supplier request
  3. Business need
  4. Vendor demonstration

Answer(s): C



The acquisition of personal data being obtained by a lawful and fair means is an example of what principle?

  1. Collection Limitation Principle
  2. Openness Principle
  3. Purpose Specification Principle
  4. Data Quality Principle

Answer(s): A



Which of the following is the MOST appropriate control for asset data labeling procedures?

  1. Categorizing the types of media being used
  2. Logging data media to provide a physical inventory control
  3. Reviewing off-site storage access controls
  4. Reviewing audit trails of logging records

Answer(s): A



What is the BEST approach to anonymizing personally identifiable information (PII) in a test environment?

  1. Swapping data
  2. Randomizing data
  3. Encoding data
  4. Encrypting data

Answer(s): B






Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

Join the CISSP Discussion