exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 200 discussion

Actual exam question from ISC's CISSP
Question #: 200
Topic #: 1
[All CISSP Questions]

What BEST describes the confidentiality, integrity, availability triad?

  • A. A vulnerability assessment to see how well the organization's data is protected
  • B. The three-step approach to determine the risk level of an organization
  • C. The implementation of security systems to protect the organization's data
  • D. A tool used to assist in understanding how to protect the organization's data
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stickerbush1970
Highly Voted 2 years, 5 months ago
Selected Answer: C
CIA is all about Data and access to it. I don't have a good reason for C, however I would go C by elimination of the others, B doesn't have the word data in the answer, CIA is not an vulnerability assessment, and CIA isn't a tool.
upvoted 10 times
jackdryan
1 year, 9 months ago
C is correct
upvoted 1 times
...
...
inmymind84
Highly Voted 2 years, 5 months ago
Selected Answer: D
Why it isnt D?
upvoted 8 times
maawar83
1 year, 1 month ago
it is not a tool
upvoted 1 times
eboehm
10 months, 2 weeks ago
yes it is. It is used to assist you in figuring out how to implement controls based on those 3 principles
upvoted 1 times
...
...
...
angellorv
Most Recent 1 month, 4 weeks ago
Selected Answer: C
CISSP Official Study Guide (page 4-5) The CIA triad is a security concept and is perceived as the primary goal and objective of a security infrastructure. It defines the basic parameters needed for a secure environment. Security controls are evaluated on how well they address these three core information security tenets.
upvoted 1 times
...
RRabbit_111
2 months, 3 weeks ago
Selected Answer: D
The CIA Triad guides security implementations, but it is not the implementation itself. It is a model or tool for planning and analysis.
upvoted 1 times
...
KJ44
3 months, 3 weeks ago
Selected Answer: D
it is there to assist in our understanding.
upvoted 1 times
...
deeden
6 months, 2 weeks ago
Selected Answer: A
I vote A just because.. the CIA triad is a conceptual framework for understanding information security objectives, rather than a specific methodology or tool. A vulnerability assessment is a process to identify weaknesses in an organization's systems and networks.
upvoted 1 times
...
1460168
6 months, 3 weeks ago
Selected Answer: D
The C-I-A triad is a framework to help us understand how to proceed, for example when securing data. It is therefore irrelevant whether the word ‘tool’ is to be understood here as software, it is rather to be understood as an assistant.
upvoted 1 times
...
50e940e
7 months, 4 weeks ago
Selected Answer: D
security systems did not mean program or framework. We may not develop systems to protect our data
upvoted 2 times
...
CCNPWILL
9 months ago
C is the best option given the wording. deleted the other A and B based on just being way off.
upvoted 1 times
...
eboehm
10 months, 2 weeks ago
Selected Answer: D
Haha soooo many people on here have zero understanding of the word "tool" A tool is ANYTHING that would assist you with the implementation. This could be training, google, a manual, a model, a concept, a standard, CISSP certification, the list goes on. Hillarious how many think the CIA triad, an intangible construct that is only in our heads, is somehow an implementation of security controls
upvoted 2 times
...
gjimenezf
1 year, 1 month ago
Selected Answer: C
Data security
upvoted 1 times
...
SpaceMonkey1
1 year, 3 months ago
Selected Answer: D
Option C could be interpreted as implying that the confidentiality, integrity, and availability (CIA) triad refers to the implementation of security systems to protect an organization's data. While security systems are indeed employed to uphold these principles, the CIA triad itself is not a specific implementation or system but rather a foundational concept guiding security strategies. The CIA triad outlines three primary objectives essential to information security—ensuring data confidentiality, maintaining data integrity, and guaranteeing data availability. It's a principle or guideline used to shape the design, selection, and implementation of security measures and systems within an organization to protect its data and resources. Therefore, while security systems are implemented to align with the CIA triad, the triad itself represents the overarching principles rather than the specific tools or systems used for protection.
upvoted 3 times
...
74gjd_37
1 year, 5 months ago
Selected Answer: C
Among the given options, C best describes the CIA triad from a CISSP perspective as it highlights the implementation of security systems to safeguard and protect an organization's data.
upvoted 2 times
...
Nicola_2_Reg
1 year, 5 months ago
Selected Answer: D
The wording is not appropriate enough... I mean, D would be more accurate. CIA triad does not implement, it is a concept (moreless a immaterial tool to help CISOs).
upvoted 2 times
...
georgegeorge125487
1 year, 6 months ago
Selected Answer: A
A model (i.e. a sort of tool or approach) to manage security.
upvoted 1 times
...
dmo_d
1 year, 9 months ago
This is another language comprehension test. I interpreted "tool" as a metaphor for "something that helps", which could also apply to frameworks, models, etc. But obviously I was wrong. :-(
upvoted 1 times
...
SaintDaSinner
2 years ago
Selected Answer: C
The CIA triad is widely accepted as a model "not a Tool" in information security.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago