Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam CISSP Topic 5 Question 100 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 100
Topic #: 5
[All CISSP Questions]

The Chief Information Security Officer (CISO) of an organization has requested that a Service Organization Control (SOC) report be created to outline the security and availability of a

particular system over a 12-month period. Which type of SOC report should be utilized?

Show Suggested Answer Hide Answer
Suggested Answer: B

The type of SOC report that should be utilized to outline the security and availability of a particular system over a 12-month period is SOC 2 Type 2. SOC 2 Type 2 is a security audit report that provides information about the design and the operating effectiveness of the controls at a service organization relevant to the security and availability trust service categories, as well as the other trust service categories such as processing integrity, confidentiality, and privacy. SOC 2 Type 2 is the type of SOC report that should be utilized to outline the security and availability of a particular system over a 12-month period, because it can:

Evaluate and assess the design and the effectiveness of the controls that the service organization has implemented and maintained for ensuring the security and availability of the system and the data that are used for providing the services or the solutions to the user entities or the customers, based on the criteria or the principles of the Trust Services Categories (TSC).

Provide and present the information and the data about the service organization's system and the controls in relation to the security and availability, in the form of the audit report or the opinion that is prepared and issued by the independent auditor or the practitioner, and that is intended for the general or the restricted use of the user entities and the other interested or relevant parties or stakeholders.

Cover a specified period of time, usually between six and twelve months, and include the description of the tests of controls and the results performed by the auditor, to demonstrate the operational effectiveness of the controls over the security and availability of the system and the data.

The other options are not the types of SOC report that should be utilized to outline the security and availability of a particular system over a 12-month period. SOC 1 Type 1 is a security audit report that provides information about the design of the controls at a service organization relevant to the internal control over financial reporting of the user entities or the customers, based on the control objectives defined by the service organization. SOC 1 Type 1 is not the type of SOC report that should be utilized to outline the security and availability of a particular system over a 12-month period, because it does not:

Evaluate and assess the effectiveness of the controls that the service organization has implemented and maintained for ensuring the security and availability of the system and the data, but rather the controls that affect the financial reporting of the user entities or the customers.

Provide and present the information and the data about the service organization's system and the controls in relation to the security and availability, but rather the controls in relation to the internal control over financial reporting of the user entities or the customers.

Cover a specified period of time, or include the description of the tests of controls and the results performed by the auditor, but rather evaluate the design of the controls at a point in time.

SOC 2 Type 1 is a security audit report that provides information about the design of the controls at a service organization relevant to the security and availability trust service categories, as well as the other trust service categories such as processing integrity, confidentiality, and privacy. SOC 2 Type 1 is not the type of SOC report that should be utilized to outline the security and availability of a particular system over a 12-month period, because it does not:

Evaluate and assess the effectiveness of the controls that the service organization has implemented and maintained for ensuring the security and availability of the system and the data, but rather the design of the controls at a point in time.

Include the description of the tests of controls and the results performed by the auditor, to demonstrate the operational effectiveness of the controls over the security and availability of the system and the data.

SOC 3 Type 1 is a security audit report that provides information about the design of the controls at a service organization relevant to the security and availability trust service categories, as well as the other trust service categories such as processing integrity, confidentiality, and privacy. SOC 3 Type 1 is not the type of SOC report that should be utilized to outline the security and availability of a particular system over a 12-month period, because it does not:

Evaluate and assess the effectiveness of the controls that the service organization has implemented and maintained for ensuring the security and availability of the system and the data, but rather the design of the controls at a point in time.

Include the description of the tests of controls and the results performed by the auditor, to demonstrate the operational effectiveness of the controls over the security and availability of the system and the data.

Provide and present the information and the data about the service organization's system and the controls in relation to the security and availability, in the form of the audit report or the opinion, but rather in the form of the seal or the logo that indicates the compliance with the TSC.


Contribute your Thoughts:

Roselle
23 days ago
I can't believe the CISO is even considering anything other than SOC 2 Type 2. It's like asking for a 'Get Out of Jail Free' card for the system's security.
upvoted 0 times
Keva
4 days ago
B) SOC 2 Type 2
upvoted 0 times
...
Nobuko
6 days ago
A) SOC 2 Type 2
upvoted 0 times
...
...
Felicitas
28 days ago
I'd recommend SOC 2 Type 2. It's like hiring a private investigator to dig into the system's inner workings and give a detailed report.
upvoted 0 times
Nicholle
4 days ago
B) SOC 2 Type 2
upvoted 0 times
...
Veta
7 days ago
A) SOC 1 Type 1
upvoted 0 times
...
...
Tashia
1 months ago
SOC 2 Type 2 is the clear choice here. It's like getting a VIP pass to the behind-the-scenes of the system's security and availability.
upvoted 0 times
...
Tonja
1 months ago
You're right, I see your point. SOC 2 Type 2 makes more sense in this scenario.
upvoted 0 times
...
Ayesha
1 months ago
I think SOC 2 Type 2 is the way to go. It's like getting a full body check-up for your system, not just a quick snapshot.
upvoted 0 times
...
Dustin
1 months ago
But SOC 1 Type 1 focuses on internal controls, while SOC 2 Type 2 is more about security and availability.
upvoted 0 times
...
Tonja
1 months ago
I disagree, I believe it should be B) SOC 2 Type 2.
upvoted 0 times
...
Dustin
1 months ago
I think the answer is A) SOC 1 Type 1.
upvoted 0 times
...
Jordan
1 months ago
The CISO should definitely go with SOC 2 Type 2. It provides a comprehensive report on the security and availability of the system over time.
upvoted 0 times
Devorah
18 days ago
C) SOC 2 Type 2
upvoted 0 times
...
Ashley
28 days ago
B) SOC 2 Type 2
upvoted 0 times
...
Terina
1 months ago
A) SOC 1 Type 1
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77