exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 1135 discussion

Actual exam question from Isaca's CISA
Question #: 1135
Topic #: 1
[All CISA Questions]

Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?

  • A. Monitoring tools are configured to alert in case of downtime.
  • B. A comprehensive security review is performed every quarter.
  • C. Data for different tenants is segregated by database schema
  • D. Tenants are required to implement data classification policies.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
SRJ13
Highly Voted 1 year, 10 months ago
Option C. In a multi-tenant cloud environment, where multiple tenants share the same infrastructure, it is essential to ensure that data is kept separate and secure to prevent data leakage. Segregating data by database schema is a common method for enforcing data leakage prevention in a multi-tenant cloud environment. This method involves creating separate database schemas for each tenant, ensuring that data is stored and managed separately, and access is restricted to authorized users. While monitoring tools, comprehensive security reviews, and data classification policies are all important methods for enforcing data leakage prevention, they are not as effective as segregating data by database schema in a multi-tenant cloud environment. Segregating data by database schema helps ensure that data is kept separate and secure, minimizing the risk of data leakage and protecting the confidentiality and integrity of the data.
upvoted 8 times
...
Swallows
Most Recent 10 months ago
Selected Answer: D
All organizations need to classify the data they create, manage, and store. In large enterprise environments, this is even more critical as data assets are distributed across many locations, including the cloud. Administrators need to track and audit this information to ensure that proper authentication and access controls are in place. Data classification enables administrators to identify where sensitive data is stored and how it is accessed and shared.
upvoted 1 times
...
KAP2HURUF
1 year ago
Selected Answer: C
While data classification policies (option D) are important for managing and securing data, the question specifically asks about enforcing data leakage prevention in a multi-tenant cloud environment. Option C, segregating data by database schema for different tenants, is a more direct and effective method in this context. It ensures that data from different tenants is physically separated, reducing the risk of unintended data leakage between tenants in a shared environment.
upvoted 2 times
...
FAGFUR
1 year, 2 months ago
Selected Answer: C
In a multi-tenant cloud environment, where multiple users or tenants share the same infrastructure, it's essential to enforce data leakage prevention. Segregating data by database schema is a method that helps achieve this goal. Each tenant has its own database schema, which ensures isolation and separation of their data. This segregation helps prevent data leakage between tenants and enhances data privacy and security.
upvoted 4 times
...
SuperMax
1 year, 3 months ago
Selected Answer: C
In a multi-tenant cloud environment, where multiple organizations or tenants share the same infrastructure, enforcing data leakage prevention is critical to maintaining data security and privacy. Among the options provided, the method that BEST enforces data leakage prevention is: C. Data for different tenants is segregated by database schema. This approach ensures that data from different tenants is physically separated at the database schema level, reducing the risk of unauthorized access and data leakage between tenants. It provides a strong isolation mechanism to prevent data from leaking from one tenant to another. However, it's important to note that additional security measures, such as encryption, access controls, and regular security reviews, should complement this segregation to create a comprehensive security strategy.
upvoted 3 times
...
hoho
1 year, 6 months ago
Agree on C, Segregating database schema
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...