Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 200 discussion

Actual exam question from ISC's CISSP
Question #: 200
Topic #: 1
[All CISSP Questions]

What BEST describes the confidentiality, integrity, availability triad?

  • A. A vulnerability assessment to see how well the organization's data is protected
  • B. The three-step approach to determine the risk level of an organization
  • C. The implementation of security systems to protect the organization's data
  • D. A tool used to assist in understanding how to protect the organization's data
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
stickerbush1970
Highly Voted 2 years, 2 months ago
Selected Answer: C
CIA is all about Data and access to it. I don't have a good reason for C, however I would go C by elimination of the others, B doesn't have the word data in the answer, CIA is not an vulnerability assessment, and CIA isn't a tool.
upvoted 10 times
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
...
...
inmymind84
Highly Voted 2 years, 2 months ago
Selected Answer: D
Why it isnt D?
upvoted 8 times
maawar83
10 months, 4 weeks ago
it is not a tool
upvoted 1 times
eboehm
7 months, 2 weeks ago
yes it is. It is used to assist you in figuring out how to implement controls based on those 3 principles
upvoted 1 times
...
...
...
KJ44
Most Recent 2 weeks, 4 days ago
Selected Answer: D
it is there to assist in our understanding.
upvoted 1 times
...
deeden
3 months, 2 weeks ago
Selected Answer: A
I vote A just because.. the CIA triad is a conceptual framework for understanding information security objectives, rather than a specific methodology or tool. A vulnerability assessment is a process to identify weaknesses in an organization's systems and networks.
upvoted 1 times
...
1460168
3 months, 3 weeks ago
Selected Answer: D
The C-I-A triad is a framework to help us understand how to proceed, for example when securing data. It is therefore irrelevant whether the word ‘tool’ is to be understood here as software, it is rather to be understood as an assistant.
upvoted 1 times
...
50e940e
4 months, 3 weeks ago
Selected Answer: D
security systems did not mean program or framework. We may not develop systems to protect our data
upvoted 2 times
...
CCNPWILL
5 months, 3 weeks ago
C is the best option given the wording. deleted the other A and B based on just being way off.
upvoted 1 times
...
eboehm
7 months, 2 weeks ago
Selected Answer: D
Haha soooo many people on here have zero understanding of the word "tool" A tool is ANYTHING that would assist you with the implementation. This could be training, google, a manual, a model, a concept, a standard, CISSP certification, the list goes on. Hillarious how many think the CIA triad, an intangible construct that is only in our heads, is somehow an implementation of security controls
upvoted 1 times
...
gjimenezf
10 months, 1 week ago
Selected Answer: C
Data security
upvoted 1 times
...
SpaceMonkey1
1 year ago
Selected Answer: D
Option C could be interpreted as implying that the confidentiality, integrity, and availability (CIA) triad refers to the implementation of security systems to protect an organization's data. While security systems are indeed employed to uphold these principles, the CIA triad itself is not a specific implementation or system but rather a foundational concept guiding security strategies. The CIA triad outlines three primary objectives essential to information security—ensuring data confidentiality, maintaining data integrity, and guaranteeing data availability. It's a principle or guideline used to shape the design, selection, and implementation of security measures and systems within an organization to protect its data and resources. Therefore, while security systems are implemented to align with the CIA triad, the triad itself represents the overarching principles rather than the specific tools or systems used for protection.
upvoted 3 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: C
Among the given options, C best describes the CIA triad from a CISSP perspective as it highlights the implementation of security systems to safeguard and protect an organization's data.
upvoted 2 times
...
Nicola_2_Reg
1 year, 2 months ago
Selected Answer: D
The wording is not appropriate enough... I mean, D would be more accurate. CIA triad does not implement, it is a concept (moreless a immaterial tool to help CISOs).
upvoted 2 times
...
georgegeorge125487
1 year, 3 months ago
Selected Answer: A
A model (i.e. a sort of tool or approach) to manage security.
upvoted 1 times
...
dmo_d
1 year, 6 months ago
This is another language comprehension test. I interpreted "tool" as a metaphor for "something that helps", which could also apply to frameworks, models, etc. But obviously I was wrong. :-(
upvoted 1 times
...
SaintDaSinner
1 year, 9 months ago
Selected Answer: C
The CIA triad is widely accepted as a model "not a Tool" in information security.
upvoted 2 times
...
DJOEK
1 year, 10 months ago
Selected Answer: C
agree with stickerbush1970. No other reasoning
upvoted 2 times
...
rajkamal0
1 year, 11 months ago
Selected Answer: C
C is the correct answer. CIA Triad is not a tool.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...