exam questions

Exam CRISC All Questions

View all questions & answers for the CRISC exam

Exam CRISC topic 1 question 653 discussion

Actual exam question from Isaca's CRISC
Question #: 653
Topic #: 1
[All CRISC Questions]

Which of the following is MOST effective against external threats to an organization's confidential information?

  • A. Single sign-on
  • B. Strong authentication
  • C. Data integrity checking
  • D. Intrusion detection system
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
01010100
10 months ago
Selected Answer: D
D. Intrusion Detection System An Intrusion Detection System (IDS) is designed to monitor network and/or system activities for malicious exploits or security breaches. It is one of the most effective measures against external threats trying to gain unauthorized access to an organization's confidential information. Option A (Single sign-on) is more about user convenience and reducing password fatigue rather than directly protecting against external threats. Option B (Strong authentication) is effective in ensuring that only authorized individuals can access systems but is not specifically tailored to combat external threats like an IDS. Option C (Data integrity checking) ensures that data has not been altered but does not necessarily protect against the initial intrusion where confidential data can be accessed. Therefore, an IDS is the most effective against external threats aimed at compromising confidential information.
upvoted 1 times
...
Staanlee
10 months, 3 weeks ago
Selected Answer: B
B. Strong authentication Strong authentication is the most effective measure against external threats to an organization's confidential information. Strong authentication typically involves the use of multiple factors to verify a user's identity, such as something the user knows (e.g., a password), something the user has (e.g., a smart card or token), and something the user is (e.g., biometric data like a fingerprint or facial recognition). This multi-factor approach significantly enhances security by making it much more difficult for unauthorized individuals to gain access to confidential information, even if they possess some of the authentication factors.
upvoted 1 times
...
Roxton
1 year, 3 months ago
It should be D. the question is talking about external threat. strong authentication can also prevent internal threat. I go with D since external threat can be detected using IDS
upvoted 1 times
...
CbtL
1 year, 3 months ago
Selected Answer: B
It is B.
upvoted 2 times
...
Julianleehk
1 year, 5 months ago
should be B
upvoted 2 times
...
john_boogieman
1 year, 5 months ago
Selected Answer: B
An IDS is a detective control that is not effective for the purpose of the question.
upvoted 3 times
...
johnwalters
1 year, 10 months ago
D is not valid with zero trust security. It’s also only detective, not preventative. should be b
upvoted 3 times
...
Ics2Pass
3 years, 4 months ago
Why not Strong Authentication control?
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...