Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 212 discussion

Actual exam question from Isaca's CISM
Question #: 212
Topic #: 1
[All CISM Questions]

Which of the following is the MOST effective defense against malicious insiders compromising confidential information?

  • A. Regular audits of access controls
  • B. Strong background checks when hiring staff
  • C. Prompt termination procedures
  • D. Role-based access control
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Ziggybooboo
Highly Voted 2 years, 1 month ago
D I think
upvoted 6 times
...
Hugo1717
Highly Voted 1 year, 2 months ago
Selected Answer: B
Its B - Reason why its not A: Role-based access control is a critical security measure, but it might not prevent an insider who is already authorized from abusing their access privileges.
upvoted 5 times
...
david124
Most Recent 1 week, 4 days ago
Selected Answer: D
I was pro B, but now i reread the question, its not asking for what is best practices. its telling you users were ALREADY HIRED, what do we do now? which why its D. had it said oh what can we do to ensure insider threat is mitigated then yea B all the way, but its D since they are onboarded and hired. you are past background checks
upvoted 1 times
...
Jess20
3 weeks, 5 days ago
Selected Answer: D
D. Role based access control in thos case. There is another similar question that asks FIRST step and for that one is the background check/ screening. We should read carefully
upvoted 2 times
...
RagazzoAlex
3 months, 3 weeks ago
Selected Answer: D
This is the practical measure, employees screening is not applicabe sometimes
upvoted 2 times
...
03allen
6 months, 2 weeks ago
Selected Answer: B
What if the insider has the access to the confidence data by his role, then the RBAC wont help.
upvoted 1 times
...
cidigi
7 months, 1 week ago
QAE Paper version page 111 it has the answer, which is RBAC
upvoted 1 times
...
Thavee
7 months, 2 weeks ago
Selected Answer: B
Only B. RBAC does not help. What about one of the top management/board of directors is a bad guy. He has privileges to many important information at his manageable level.
upvoted 3 times
...
oluchecpoint
9 months, 2 weeks ago
Selected Answer: D
D. Role-based access control (RBAC). Role-based access control is a security strategy that limits access to computer systems and data based on individuals' roles or job functions within an organization. It ensures that individuals only have access to the information and resources necessary for them to perform their job duties, and nothing more. This approach minimizes the potential for unauthorized access to sensitive data by limiting access privileges to only what is required for an individual's specific role.
upvoted 1 times
...
Alizadeh
9 months, 2 weeks ago
Selected Answer: D
D. Role-based access control
upvoted 1 times
...
AlexJacobson
9 months, 4 weeks ago
Selected Answer: D
This is indeed a tough one. It could easily be B, as this has been reiterated in CISM and CISSP books. Also, background checks are preventative control. However, Hemang Doshi's CISM Exam prep guide (2nd Edition) book says the following: "The best way to protect confidential information from an insider threat is to provide access to confidential information on a need-toknow basis, that is, role-based access control. " So I'm going to go with D here, but I'm not 100% sure.
upvoted 2 times
...
blehbleh
10 months, 1 week ago
Selected Answer: D
Again, this question makes it sound like the individuals have already been hired so I would go D. They need a clear indication in these questions if the individuals are already "working" in the company or not.
upvoted 1 times
...
jcisco123
10 months, 3 weeks ago
Selected Answer: A
RBAC is not effective if malicious user's job involves accessing sensitive data. Background checks can't confirm employee's current behaviour. The only way to check is by doing regular audits hence A.
upvoted 3 times
...
Uncle_Lucifer
11 months, 1 week ago
Selected Answer: D
How can hiring mitigations be selected as best? Insider is someone already in the organization. D is the only reasonable answer!
upvoted 2 times
...
Learner76
11 months, 3 weeks ago
Selected Answer: D
D - Is the most logical and effective control here. Strong background check is only initia screening
upvoted 2 times
...
Soleandheel
12 months ago
The answer is D. Role-based access control B.Strong background check can not be the correct answer because this is an HR responsibility and also because someone had a positive background check doesn't guarantee that they will be a trustworthy employee. Also, employees change over time. I good and trustworthy employee today may not necessarily be a good and trustworthy employee tomorrow. People and situations do change and as such the best answer from the option is RBAC. It limits access privileges to only authorised individuals based on roles and responsibilities.
upvoted 2 times
...
ImTired
1 year, 1 month ago
Selected Answer: D
D. Role-based access control. (RBAC) A. Regular audits of access controls help ensure that access privileges are aligned with roles and responsibilities, but RBAC is the foundation for defining those privileges. B. Strong background checks when hiring staff are essential for screening candidates, but RBAC controls access for employees after they are hired. C. Prompt termination procedures are crucial for revoking access when an employee leaves the organization, but RBAC ensures that access is appropriately restricted during employment.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...