Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CRISC topic 1 question 413 discussion

Actual exam question from Isaca's CRISC
Question #: 413
Topic #: 1
[All CRISC Questions]

Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?

  • A. Implement segregation of duties
  • B. Enforce an internal data access policy
  • C. Enforce the use of digital signatures
  • D. Apply single sign-on for access control
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Anon530
Highly Voted 3 years, 1 month ago
Agree with comments above. Answer should be B. SSO is the wrong answer.
upvoted 11 times
...
Rooks
Highly Voted 3 years, 7 months ago
Answer should be B. Even if internal users use SSO, they should not have access to those data By default if it is restricted for them.
upvoted 6 times
...
Nitelifer
Most Recent 3 months, 1 week ago
Selected Answer: B
B. Governs all other options and its enforced. Research suggests: CISA Review Manual, 27th Edition, page 2301 CISA Review Questions, Answers & Explanations Database - 12 Month Subscription2 but I have no access to this material to confirm.
upvoted 1 times
...
Abbey2
3 months, 1 week ago
Selected Answer: B
B. Enforce an internal data access policy: This is directly relevant to controlling access to confidential information. Enforcing an internal data access policy ensures that only authorized personnel have access to sensitive information, based on their role and need-to-know basis. This policy would include mechanisms like access controls, user authentication, and authorization levels, which are essential to safeguard confidential data.
upvoted 1 times
...
Petza
3 months, 2 weeks ago
Selected Answer: B
B. Enforce an internal data access policy Enforcing an internal data access policy is crucial in controlling who can access what information within a business application system. This policy should define the roles and responsibilities of users, specify what data they are allowed to access based on their role, and establish protocols for granting, reviewing, and revoking access rights. Such a policy is central to maintaining the confidentiality of information by ensuring that only authorized individuals have access to sensitive data.
upvoted 1 times
...
Kennethlim79
4 months, 3 weeks ago
Selected Answer: B
B. Enforce an internal data access policy Enforcing an internal data access policy is crucial for controlling who has access to confidential information and under what circumstances. This policy should define roles, responsibilities, and permissions for different users or groups within the organization. It should specify what data can be accessed, by whom, and for what purposes. This approach ensures that only authorized personnel have access to sensitive information, reducing the risk of unauthorized retrieval.
upvoted 1 times
...
mih
8 months, 1 week ago
Selected Answer: B
It should be B
upvoted 2 times
...
01010100
8 months, 4 weeks ago
Selected Answer: B
Confidential information stored in a business application system is typically protected through the implementation and enforcement of a robust data access policy. This policy outlines who has access to what data under what circumstances, thereby preventing unauthorized retrieval of confidential information.
upvoted 1 times
...
pastor1
10 months, 3 weeks ago
Selected Answer: A
Segregation of duties is a security control that divides the responsibilities for processing and accessing confidential information among different individuals. This makes it more difficult for unauthorized individuals to gain access to confidential information.
upvoted 1 times
...
CbtL
11 months, 3 weeks ago
Selected Answer: A
More inclined to go with A. Segregation of Duties is preventative in nature. Access Policy, assuming administrative, would be more deterrent in nature.
upvoted 2 times
...
Julianleehk
11 months, 3 weeks ago
Should be B
upvoted 1 times
...
john_boogieman
1 year, 1 month ago
Selected Answer: A
Both implementing segregation of duties and enforcing an internal data access policy are appropriate measures to prevent unauthorized retrieval of confidential information stored in a business application system, but implementing segregation of duties is generally considered the more effective control.
upvoted 3 times
...
Boubou480
1 year, 2 months ago
Selected Answer: D
Should be D
upvoted 1 times
...
cybervds
1 year, 3 months ago
Selected Answer: B
B is the only answer that inherently provides confidentiality
upvoted 1 times
...
Suchib
1 year, 3 months ago
Selected Answer: B
Defintely access control policy.
upvoted 1 times
...
BituBaba
1 year, 7 months ago
Selected Answer: B
Enforce an internal data access policy
upvoted 1 times
...
Ceecil1959
1 year, 11 months ago
I also stand by Answer B: Enforce internal data classification Single Sign-on does not satisfy the protection of data as it just allows a single point of sign-on with authorization to access applications.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...