exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 240 discussion

Actual exam question from ISC's CISSP
Question #: 240
Topic #: 1
[All CISSP Questions]

Which of the following would be the BEST guideline to follow when attempting to avoid the exposure of sensitive data?

  • A. Monitor mail servers for sensitive data being exfiltrated.
  • B. Educate end-users on methods of attacks on sensitive data.
  • C. Establish report parameters for sensitive data.
  • D. Store sensitive data only when necessary.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Cww1
Highly Voted 1 year, 5 months ago
given answer is correct. collection limitation
upvoted 8 times
jackdryan
10 months ago
D is correct
upvoted 1 times
...
...
franbarpro
Highly Voted 1 year, 4 months ago
Selected Answer: D
When something is not available - that means is secure. No one can access it!!! So, D. Only store when necessary.
upvoted 6 times
Nickolos
1 year, 3 months ago
Except the question asks about data that is already stored, not the data that is not yet stored.
upvoted 1 times
...
...
homeysl
Most Recent 4 months, 3 weeks ago
Selected Answer: D
D. Collection limitation. They cannot steal sensitive data if you don't have it.
upvoted 1 times
...
74gjd_37
5 months, 2 weeks ago
Selected Answer: D
Storing sensitive data only when necessary is a guideline that helps to minimize the risk of data exposure or compromise. This guideline is based on the principle of data minimization, which means that organizations should only collect, process, and store the minimum amount of data necessary to accomplish their business objectives. By following this guideline, organizations can reduce the potential for data breaches, unauthorized access, and other security incidents that may result in the exposure of sensitive information. It is important for end-users to be aware of the risks associated with sensitive data and the various methods of attacks that may be used to compromise it. However, this guideline alone may not be sufficient to prevent the exposure of sensitive data.
upvoted 1 times
...
DJOEK
1 year, 2 months ago
Selected Answer: D
D. Store sensitive data only when necessary would be the BEST guideline to follow when attempting to avoid the exposure of sensitive data. Storing sensitive data only when it is necessary means limiting the amount of sensitive data stored, reducing the risk of data breaches, and minimizing the impact of such breaches. It is important to minimize the amount of sensitive data stored by identifying what data is truly necessary for business operations, and to store it in a secure location that is protected with strong access controls and encryption. Other measures like monitoring mail servers, educating end-users, and establishing report parameters are important, but they are supplementary to the main principle of storing sensitive data only when it is needed.
upvoted 1 times
...
Delab202
1 year, 2 months ago
A description of best practices or recommendations for achieving a specific policy goal. if you implement option B you will achieve option D Selected answer: B
upvoted 1 times
...
ringoru
1 year, 2 months ago
Answer is B. "BEST guideline to follow" This can be seen as security awareness guidelines.
upvoted 1 times
...
Jamati
1 year, 4 months ago
Selected Answer: D
Given answer is correct
upvoted 1 times
...
WiDeBarulho
1 year, 4 months ago
Selected Answer: B
Going with "B" as collection limitation does not protect your data from being exposed; it only limits how much sensitive data is exposed if you get hacked. The keywords in the question "guideline" and "attempting" tells you that they're trying to change user behavior since those users are the ones in touch of some of this sensitive data.
upvoted 4 times
...
Yanjun
1 year, 5 months ago
I prefer B. People is always the key factor of cyber security.
upvoted 2 times
franbarpro
1 year, 4 months ago
You can't rely on end-user to secure your org. YES educate them to not click on phishing emails, etc to change their behavior!
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago