nerdexam
(ISC)2(ISC)2

CISSP · Question #697

CISSP Question #697: Real Exam Question with Answer & Explanation

The correct answer is B: Token-based authentication. This question appears to have a mismatch between the question stem and the answer choices, as the choices relate to network/security technologies rather than retention policies. Based on the correct answer provided, token-based authentication is identified as the answer.

Submitted by yuriko_h· Mar 5, 2026Security and Risk Management

Question

How should the retention period for an organization's social media content be defined?

Options

  • AWireless Access Points (AP)
  • BToken-based authentication
  • CHost-based firewalls
  • DTrusted platforms

Explanation

This question appears to have a mismatch between the question stem and the answer choices, as the choices relate to network/security technologies rather than retention policies. Based on the correct answer provided, token-based authentication is identified as the answer.

Common mistakes.

  • A. Wireless Access Points (AP) are hardware devices that provide wireless network connectivity and have no relevance to defining content retention periods or authentication frameworks.
  • C. Host-based firewalls are software firewalls installed on individual endpoints to control inbound and outbound traffic, which is unrelated to social media content retention policy definitions.
  • D. Trusted platforms (e.g., Trusted Platform Module/TPM) refer to hardware-based security modules that store cryptographic keys, and are not relevant to defining organizational retention schedules for social media content.

Concept tested. Token-based authentication and access control concepts

Topics

#data retention#social media policy#information governance

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions