exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 18 discussion

Actual exam question from ISC's CISSP
Question #: 18
Topic #: 1
[All CISSP Questions]

Which of the following is the BEST way to protect an organization's data assets?

  • A. Encrypt data in transit and at rest using up-to-date cryptographic algorithms.
  • B. Monitor and enforce adherence to security policies.
  • C. Require Multi-Factor Authentication (MFA) and Separation of Duties (SoD).
  • D. Create the Demilitarized Zone (DMZ) with proxies, firewalls and hardened bastion hosts.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
godchild
Highly Voted 2 years, 9 months ago
policy vs encryption = management vs technical staff. Which is more important? I choose policy because CISSP needs you to think like a manager..
upvoted 39 times
wins34
1 year, 3 months ago
in option B . There is no clear indication as they are secure policies. So can't trust those policies if they are outdated.
upvoted 2 times
Cosy
1 month, 3 weeks ago
Thats why you should "monitor"
upvoted 2 times
...
...
jackdryan
2 years, 1 month ago
B is correct
upvoted 4 times
...
franbarpro
2 years, 9 months ago
Having a hardtime to understand how "Security Policies" could be the BEST way to protect an organization's data assets. If we don't have technical controls in place - users tend to just do wheterver. Imagine having a policy that says change your password every 90 days. How many people will do that? But if GPO expires their password.... they will change it right way.
upvoted 7 times
Yohanes411
5 months, 1 week ago
For you to have the technical controls in place, you must have already developed policies and procedures which lay the foundation for how the technical controls are to be implemented. Technical control implementation is the reflection of your policies.
upvoted 1 times
...
FredDurst
8 months, 3 weeks ago
SOLID B .... it's more like changing the culture . Even if you use encryption at rest or in transit they can write the data down on a a sticky note , share their screen with third parties , use their cellphone and take snaps of their work computer with confidential data displayed , get hooked on a social engineering scam etc . It all boils down to the the people at the end of the day and their respect for the policy either through pure logic or out of fear of disciplinary actions (enforcement) .
upvoted 9 times
...
N00b1e
2 years, 9 months ago
But if you don't have any policy to say when passwords should expire, would they never expire? Policy > Standards > Guidelines > Procedure
upvoted 8 times
...
...
...
DButtare
Highly Voted 2 years, 9 months ago
Selected Answer: B
I'm for the "B", encryption is part of the policy.
upvoted 12 times
...
T_dawg
Most Recent 2 weeks, 1 day ago
Selected Answer: B
Protecting data is not only protecting the confidentiality (encryption). It does not guarantee availability or integrity.
upvoted 1 times
...
cjace
1 month ago
Selected Answer: A
A. Encrypt data in transit and at rest using up-to-date cryptographic algorithms. Here's why: While all the options listed are important components of a comprehensive security strategy, encryption directly protects the confidentiality and integrity of data, even if other defenses fail. It ensures that: Data in transit (e.g., over networks) is protected from interception. Data at rest (e.g., on servers or storage devices) is protected from unauthorized access. Modern cryptographic algorithms reduce the risk of data being compromised due to outdated or weak encryption.
upvoted 1 times
...
SH_
3 months ago
Selected Answer: B
B encompasses the others.
upvoted 2 times
...
CKaraf
3 months, 1 week ago
Selected Answer: A
A is the proactive method. B the reactive. A is preferred
upvoted 1 times
...
HazRic
3 months, 1 week ago
Selected Answer: A
Encrypting data in transit and at rest ensures that even if attackers intercept or access the data, they cannot read or misuse it without the decryption keys. This directly protects the confidentiality and integrity of the data itself, which is the core of safeguarding data assets.
upvoted 1 times
...
iRyae
4 months ago
Selected Answer: A
While monitoring and enforcing security policies (option B) is crucial for overall security, encryption directly protects the confidentiality and integrity of data by ensuring that unauthorized individuals cannot access or alter the data. Encryption of both data in transit and data at rest provides a robust layer of protection, especially in case of data breaches or unauthorized access. In contrast, enforcing security policies (option B) helps manage and guide actions, but without encryption, data might still be vulnerable even if policies are in place. Therefore, option A is the best choice
upvoted 1 times
...
karincauk
4 months, 1 week ago
Selected Answer: A
The best answer is: A. Encrypt data in transit and at rest using up-to-date cryptographic algorithms. Explanation: While all the options contribute to security, encryption is the most fundamental and effective way to protect data assets from unauthorized access, even if other security controls fail. Proper encryption ensures data confidentiality and integrity, whether it is stored (at rest) or transmitted (in transit). • B (Monitor and enforce adherence to security policies): This is important but does not directly protect data assets—it’s more about governance and compliance. • C (Require MFA and Separation of Duties): These measures strengthen access control but do not directly protect data at rest or in transit. • D (Create a DMZ with proxies, firewalls, and bastion hosts): This helps protect network boundaries but does not directly safeguard stored or transmitted data. Encryption remains the most effective safeguard for data security across various attack vectors.
upvoted 2 times
...
Bau24
4 months, 1 week ago
Selected Answer: A
Encryption only PROTECTS data
upvoted 1 times
...
easyp
4 months, 2 weeks ago
Selected Answer: B
Think like a manager
upvoted 2 times
...
Yohanes411
5 months, 1 week ago
Selected Answer: B
Policies lay the groundwork for all the other options mentioned.
upvoted 1 times
...
imather
5 months, 3 weeks ago
Selected Answer: B
B. A, C, and D are all valid ways to protect data assets. B is the one solution that can implement all of them.
upvoted 1 times
...
Scheds
5 months, 3 weeks ago
Selected Answer: B
When choosing answers, the order of priority should be People, Processes, Technology....Technology usually goes last. Think like a manager on this one.
upvoted 1 times
...
V_raven
6 months ago
Selected Answer: B
Choose b as security policies may include using encryption. B in all encompassing and is a managerial selection vs a technical one.
upvoted 2 times
...
Moose01
6 months, 2 weeks ago
Selected Answer: A
you put your gold in the safe and then you make sure who can have access to safe , when and how. secure, safe guard and enforce A is the right answer.
upvoted 1 times
...
nuggetbutts
7 months, 1 week ago
Selected Answer: B
Think like a CEO, it's B - policy
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...