Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 186 discussion

Actual exam question from Isaca's CISM
Question #: 186
Topic #: 1
[All CISM Questions]

An organization is in the process of adopting a hybrid data infrastructure, transferring all non-core applications to cloud service providers, and maintaining all core business functions in-house. The information security manager has determined a defense in depth strategy should be used. Which of the following BEST describes this strategy?

  • A. Separate security controls for applications, platforms, programs, and endpoints
  • B. Multi-factor login requirements for cloud service applications, timeouts, and complex passwords
  • C. Deployment of nested firewalls within the infrastructure
  • D. Strict enforcement of role-based access control (RBAC)
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
fac161f
2 months, 2 weeks ago
B is the correct answer, A just mentions separate controls for platforms and programs. This is not a example of Layered defense. In regard to B, we havet Authentication as a example and 3 types of controls applied to it. This is considered Layered.
upvoted 1 times
...
Hugo1717
1 year, 2 months ago
Selected Answer: A
The correct answer is A. Separate security controls for applications, platforms, programs, and endpoints. Explanation: Defense in depth is a comprehensive strategy that involves implementing multiple layers of security controls at various levels within an organization's IT infrastructure. Given the scenario of adopting a hybrid data infrastructure and transferring non-core applications to cloud service providers while maintaining core business functions in-house, applying a defense in depth strategy would involve creating multiple layers of security controls to safeguard the organization's assets. Option A is the most aligned with the principles of defense in depth, as it suggests having separate security controls for different components of the IT environment, including applications, platforms, programs, and endpoints. This approach ensures that even if one layer of security is breached, other layers provide protection.
upvoted 2 times
...
Sammy65
1 year, 3 months ago
A: es defensa en profundidad. Que inlcuye la b.
upvoted 1 times
...
karanvp
1 year, 5 months ago
Selected Answer: A
Additional Layer of protection. Example, MFA is additional protection for login
upvoted 1 times
...
richck102
1 year, 5 months ago
A. Separate security controls for applications, platforms, programs, and endpoints
upvoted 1 times
...
CarlPTY07
1 year, 8 months ago
Selected Answer: A
this is defense in depth, which is a holistic approach. not only one slide of the problem.
upvoted 3 times
...
KANLA
1 year, 9 months ago
Defense in depth strategy of keeping the CIA of an information asset is both a holistic and comprehensive method of securing applications, programs, platforms and endpoints.
upvoted 1 times
...
Broesweelies
1 year, 10 months ago
Selected Answer: A
A. Separate security controls for applications, platforms, programs, and endpoints best describes the defense in depth strategy. Defense in depth strategy is a security approach that uses multiple layers of security controls to protect an organization's infrastructure. It is used to protect against various types of threats and vulnerabilities by creating multiple barriers that an attacker must bypass before reaching the target. In this context, implementing separate security controls for applications, platforms, programs, and endpoints allows the organization to protect different aspects of its hybrid data infrastructure, which is composed of cloud and on-premises components. This approach can include different security solutions to provide different layers of protection, such as firewalls, intrusion detection systems, intrusion prevention systems, security information and event management (SIEM) systems, encryption, and access controls, among others. It can be used to protect the infrastructure, data, and applications, and help the organization to achieve a high level of security and compliance.
upvoted 2 times
...
MyKasala
1 year, 10 months ago
Selected Answer: A
A is correct
upvoted 1 times
...
aokisan
1 year, 11 months ago
Selected Answer: A
depth strategy means A.
upvoted 2 times
Ziggybooboo
1 year, 11 months ago
Disagree, B is layers of the onion, (defense in depth), ,ultiple different ways of protection
upvoted 3 times
aokisan
1 year, 11 months ago
https://www.buffalotech.com/blog-helpful-tips/defense-in-depth-a-comprehensive-strategy-for-evolving-cyberthreats Defense in depth is a holistic approach to cybersecurity. not onion.
upvoted 1 times
fac161f
2 months, 2 weeks ago
Your link supports answer B, which is best answer among the other options that reflects Defense in Depth in regard to layers.
upvoted 1 times
...
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...