Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 18 discussion

Actual exam question from ISC's CISSP
Question #: 18
Topic #: 1
[All CISSP Questions]

Which of the following is the BEST way to protect an organization's data assets?

  • A. Encrypt data in transit and at rest using up-to-date cryptographic algorithms.
  • B. Monitor and enforce adherence to security policies.
  • C. Require Multi-Factor Authentication (MFA) and Separation of Duties (SoD).
  • D. Create the Demilitarized Zone (DMZ) with proxies, firewalls and hardened bastion hosts.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
godchild
Highly Voted 2 years, 2 months ago
policy vs encryption = management vs technical staff. Which is more important? I choose policy because CISSP needs you to think like a manager..
upvoted 33 times
wins34
9 months, 1 week ago
in option B . There is no clear indication as they are secure policies. So can't trust those policies if they are outdated.
upvoted 2 times
...
jackdryan
1 year, 7 months ago
B is correct
upvoted 3 times
...
franbarpro
2 years, 2 months ago
Having a hardtime to understand how "Security Policies" could be the BEST way to protect an organization's data assets. If we don't have technical controls in place - users tend to just do wheterver. Imagine having a policy that says change your password every 90 days. How many people will do that? But if GPO expires their password.... they will change it right way.
upvoted 6 times
FredDurst
2 months ago
SOLID B .... it's more like changing the culture . Even if you use encryption at rest or in transit they can write the data down on a a sticky note , share their screen with third parties , use their cellphone and take snaps of their work computer with confidential data displayed , get hooked on a social engineering scam etc . It all boils down to the the people at the end of the day and their respect for the policy either through pure logic or out of fear of disciplinary actions (enforcement) .
upvoted 5 times
...
N00b1e
2 years, 2 months ago
But if you don't have any policy to say when passwords should expire, would they never expire? Policy > Standards > Guidelines > Procedure
upvoted 8 times
...
DButtare
2 years, 2 months ago
Think like a manager buddy
upvoted 7 times
Ariel235788
1 year, 1 month ago
Technical controls come before administrative controls, Buddy
upvoted 1 times
Ramye
6 months ago
And Policy comes first that dictates what technical controls need to be placed, Buddy :-)
upvoted 4 times
...
...
...
...
...
DButtare
Highly Voted 2 years, 2 months ago
Selected Answer: B
I'm for the "B", encryption is part of the policy.
upvoted 8 times
...
nuggetbutts
Most Recent 2 weeks, 2 days ago
Selected Answer: B
Think like a CEO, it's B - policy
upvoted 1 times
...
somsom
1 month, 1 week ago
the answer is A. all data both in transit and at rest should be encrypted with the latest encryption mechanism
upvoted 1 times
...
celomomo
1 month, 3 weeks ago
Selected Answer: A
While all of these measures are important parts of a comprehensive security strategy, encryption, op A provides the most direct and fundamental protection for the data itself. It ensures that even if other security measures fail or data is somehow accessed, it remains unreadable and protected. This makes it the BEST way to protect an organization's data assets among the given options.
upvoted 2 times
...
jens23
2 months ago
Selected Answer: B
Is encryption enough to protect the data assets? There should be broader policies such as protection against tempering of the data or a web application firewall if there is a possibility of a SQL injection for example that could reveal the protected data to the attacker. Or the attacker can just delete the encrypted data. Therefore solely encrypting data isn't correct even from the technical perspective.
upvoted 1 times
...
CCNPWILL
2 months ago
Selected Answer: B
Correct Answer is B. all training suggests policy is typically the best answer. it may even encompass all of the rest of the less correct answers.
upvoted 1 times
...
GPrep
2 months ago
Selected Answer: B
encrypting the data at rest and in transit is great for those who are unauthorized. However, the question is not that specific, reading that it applies to all types of users (authorized and not). When accounting for this interpretation of the question, B makes more sense. Additionally, B doesn't JUST list having or monitoring a policy, it is specific to also say enforce which implies technical controls.
upvoted 1 times
...
vorozco
2 months ago
Selected Answer: A
Choosing A. The AIO textbook has a section on "Data Protection Strategy" with the following key areas to consider when developing those strategies: -Backup and recovery -Data life cycle -Physical security -Security culture -Privacy -Organizational change The subsection "Data life cycle" states "we tend to disregard securing the data as it transitions from one stage to another. If we are archiving data at an offsite location, are we ensuring that it is protected as it travels there?" This implies that we SHOULD be doing option A (encrypting data in transit and at rest) as part of a data protection strategy to protect an orgs data assets. -CISSP AIO Exam Guide: Ninth Edition pg.269
upvoted 6 times
...
Bach1968
2 months ago
All the options provided are important for protecting an organization's data assets, but the BEST way to protect the data assets depends on various factors and requires a comprehensive approach. However, out of the options given, option A is generally considered the most critical and effective measure for protecting data assets. A. Encrypting data in transit and at rest using up-to-date cryptographic algorithms is essential for maintaining the confidentiality and integrity of sensitive data. Encryption ensures that even if data is intercepted or compromised, it remains unreadable and unusable without the encryption keys. While options B, C, and D are also important, they focus on different aspects of security: the protection of data assets. In summary, while all the options have their importance, encrypting data in transit and at rest using up-to-date cryptographic algorithms is generally considered the BEST way to protect an organization's data assets. However, a comprehensive approach combining multiple security measures is crucial for overall data asset protection.
upvoted 2 times
...
Law88
2 months ago
Selected Answer: A
The best way to protect an organization's data assets is not a single method, but a combination of multiple methods that address different aspects and layers of data security. However, among the four options given, the most comprehensive and effective one is A. Encrypt data in transit and at rest using up-to-date cryptographic algorithms. Option B. Monitor and enforce adherence to security policies is a good practice for ensuring compliance and awareness of data security standards and regulations, but it does not directly protect data from attacks or breaches.
upvoted 5 times
...
deeden
3 months, 3 weeks ago
Selected Answer: B
Agree with B, I feel like everything must start with a policy and go from there.
upvoted 1 times
...
8e1c45b
3 months, 4 weeks ago
Selected Answer: B
B- Think like manager
upvoted 1 times
...
f270069
4 months, 3 weeks ago
Selected Answer: A
CHAT GP
upvoted 1 times
...
50e940e
4 months, 3 weeks ago
Selected Answer: A
A is more specific. If the security policy outdated or even the policy is not developed yet?
upvoted 2 times
...
CCNPWILL
5 months, 3 weeks ago
Selected Answer: B
B encompasses A. B is more comprehensive than A. B could include access control and other control measures not specific to integrity or the like.
upvoted 1 times
...
Hardrvkllr
7 months, 2 weeks ago
I feel it's B. Because you need to monitor and enforce. This includes due diligence and care. Security policy would tell you 5 W's. I'm going with B.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...