New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 5 Question 100 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 100
Topic #: 5
[All CISSP Questions]

The Chief Information Security Officer (CISO) of an organization has requested that a Service Organization Control (SOC) report be created to outline the security and availability of a

particular system over a 12-month period. Which type of SOC report should be utilized?

Show Suggested Answer Hide Answer
Suggested Answer: B

The type of SOC report that should be utilized to outline the security and availability of a particular system over a 12-month period is SOC 2 Type 2. SOC 2 Type 2 is a security audit report that provides information about the design and the operating effectiveness of the controls at a service organization relevant to the security and availability trust service categories, as well as the other trust service categories such as processing integrity, confidentiality, and privacy. SOC 2 Type 2 is the type of SOC report that should be utilized to outline the security and availability of a particular system over a 12-month period, because it can:

Evaluate and assess the design and the effectiveness of the controls that the service organization has implemented and maintained for ensuring the security and availability of the system and the data that are used for providing the services or the solutions to the user entities or the customers, based on the criteria or the principles of the Trust Services Categories (TSC).

Provide and present the information and the data about the service organization's system and the controls in relation to the security and availability, in the form of the audit report or the opinion that is prepared and issued by the independent auditor or the practitioner, and that is intended for the general or the restricted use of the user entities and the other interested or relevant parties or stakeholders.

Cover a specified period of time, usually between six and twelve months, and include the description of the tests of controls and the results performed by the auditor, to demonstrate the operational effectiveness of the controls over the security and availability of the system and the data.

The other options are not the types of SOC report that should be utilized to outline the security and availability of a particular system over a 12-month period. SOC 1 Type 1 is a security audit report that provides information about the design of the controls at a service organization relevant to the internal control over financial reporting of the user entities or the customers, based on the control objectives defined by the service organization. SOC 1 Type 1 is not the type of SOC report that should be utilized to outline the security and availability of a particular system over a 12-month period, because it does not:

Evaluate and assess the effectiveness of the controls that the service organization has implemented and maintained for ensuring the security and availability of the system and the data, but rather the controls that affect the financial reporting of the user entities or the customers.

Provide and present the information and the data about the service organization's system and the controls in relation to the security and availability, but rather the controls in relation to the internal control over financial reporting of the user entities or the customers.

Cover a specified period of time, or include the description of the tests of controls and the results performed by the auditor, but rather evaluate the design of the controls at a point in time.

SOC 2 Type 1 is a security audit report that provides information about the design of the controls at a service organization relevant to the security and availability trust service categories, as well as the other trust service categories such as processing integrity, confidentiality, and privacy. SOC 2 Type 1 is not the type of SOC report that should be utilized to outline the security and availability of a particular system over a 12-month period, because it does not:

Evaluate and assess the effectiveness of the controls that the service organization has implemented and maintained for ensuring the security and availability of the system and the data, but rather the design of the controls at a point in time.

Include the description of the tests of controls and the results performed by the auditor, to demonstrate the operational effectiveness of the controls over the security and availability of the system and the data.

SOC 3 Type 1 is a security audit report that provides information about the design of the controls at a service organization relevant to the security and availability trust service categories, as well as the other trust service categories such as processing integrity, confidentiality, and privacy. SOC 3 Type 1 is not the type of SOC report that should be utilized to outline the security and availability of a particular system over a 12-month period, because it does not:

Evaluate and assess the effectiveness of the controls that the service organization has implemented and maintained for ensuring the security and availability of the system and the data, but rather the design of the controls at a point in time.

Include the description of the tests of controls and the results performed by the auditor, to demonstrate the operational effectiveness of the controls over the security and availability of the system and the data.

Provide and present the information and the data about the service organization's system and the controls in relation to the security and availability, in the form of the audit report or the opinion, but rather in the form of the seal or the logo that indicates the compliance with the TSC.


Contribute your Thoughts:

0/2000 characters
Vicky
2 months ago
SOC 3 Type 1 doesn't fit this scenario at all.
upvoted 0 times
...
Becky
2 months ago
Wait, are we sure about the 12-month requirement?
upvoted 0 times
...
Darci
3 months ago
I thought SOC 1 was enough for this?
upvoted 0 times
...
Delsie
3 months ago
Totally agree, SOC 2 Type 2 covers it all!
upvoted 0 times
...
Loreta
3 months ago
SOC 2 Type 2 is the way to go for security and availability!
upvoted 0 times
...
Julio
3 months ago
Wait, is SOC 3 Type 1 even relevant here? I feel like it’s more for general use and not specific to security and availability.
upvoted 0 times
...
Jennifer
4 months ago
I practiced a similar question, and I believe SOC 2 Type 2 is the right choice because it focuses on the operational effectiveness over 12 months.
upvoted 0 times
...
Laila
4 months ago
I'm not entirely sure, but I remember something about SOC 1 being more about financial controls.
upvoted 0 times
...
Iesha
4 months ago
I think we need a SOC 2 Type 2 report since it covers security and availability over a period of time, right?
upvoted 0 times
...
Paulene
4 months ago
I'm pretty confident that SOC 2 Type 2 is the correct answer. The 12-month period and the focus on security and availability align with the requirements of a SOC 2 Type 2 report.
upvoted 0 times
...
Lashon
4 months ago
The key here is that the CISO wants to outline the security and availability of a particular system. Based on that, I'd say SOC 2 Type 2 is the way to go since it provides a more comprehensive evaluation of those controls.
upvoted 0 times
...
Serina
5 months ago
Hmm, I'm a bit confused on the difference between SOC 1 and SOC 2 reports. I'll need to review the details of each type to make sure I select the right one for this scenario.
upvoted 0 times
...
Wenona
5 months ago
I think the answer is SOC 2 Type 2 since the question mentions a 12-month period, and SOC 2 reports cover security, availability, processing integrity, confidentiality, and privacy controls over a period of time.
upvoted 0 times
...
Roselle
10 months ago
I can't believe the CISO is even considering anything other than SOC 2 Type 2. It's like asking for a 'Get Out of Jail Free' card for the system's security.
upvoted 0 times
Keva
10 months ago
B) SOC 2 Type 2
upvoted 0 times
...
Nobuko
10 months ago
A) SOC 2 Type 2
upvoted 0 times
...
...
Felicitas
11 months ago
I'd recommend SOC 2 Type 2. It's like hiring a private investigator to dig into the system's inner workings and give a detailed report.
upvoted 0 times
Shannan
9 months ago
D) SOC 3 Type 1
upvoted 0 times
...
Dana
9 months ago
C) SOC 2 Type 2
upvoted 0 times
...
Fausto
9 months ago
B) SOC 2 Type 2
upvoted 0 times
...
Annice
9 months ago
A) SOC 1 Type 1
upvoted 0 times
...
Kina
9 months ago
D) SOC 3 Type 1
upvoted 0 times
...
Alona
10 months ago
C) SOC 2 Type 2
upvoted 0 times
...
Nicholle
10 months ago
B) SOC 2 Type 2
upvoted 0 times
...
Veta
10 months ago
A) SOC 1 Type 1
upvoted 0 times
...
...
Tashia
11 months ago
SOC 2 Type 2 is the clear choice here. It's like getting a VIP pass to the behind-the-scenes of the system's security and availability.
upvoted 0 times
...
Tonja
11 months ago
You're right, I see your point. SOC 2 Type 2 makes more sense in this scenario.
upvoted 0 times
...
Ayesha
11 months ago
I think SOC 2 Type 2 is the way to go. It's like getting a full body check-up for your system, not just a quick snapshot.
upvoted 0 times
...
Dustin
11 months ago
But SOC 1 Type 1 focuses on internal controls, while SOC 2 Type 2 is more about security and availability.
upvoted 0 times
...
Tonja
11 months ago
I disagree, I believe it should be B) SOC 2 Type 2.
upvoted 0 times
...
Dustin
11 months ago
I think the answer is A) SOC 1 Type 1.
upvoted 0 times
...
Jordan
11 months ago
The CISO should definitely go with SOC 2 Type 2. It provides a comprehensive report on the security and availability of the system over time.
upvoted 0 times
Devorah
10 months ago
C) SOC 2 Type 2
upvoted 0 times
...
Ashley
11 months ago
B) SOC 2 Type 2
upvoted 0 times
...
Terina
11 months ago
A) SOC 1 Type 1
upvoted 0 times
...
...

Save Cancel