Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 238 discussion

Actual exam question from ISC's CISSP
Question #: 238
Topic #: 1
[All CISSP Questions]

Which of the following is a benefit of implementing data-in-use controls?

  • A. If the data is lost, it must be decrypted to be opened.
  • B. When the data is being viewed, it can only be printed by authorized users.
  • C. When the data is being viewed, it can be accessed using secure protocols.
  • D. If the data is lost, it may not be accessible to unauthorized users.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
DracoL
Highly Voted 2 years, 1 month ago
Selected Answer: B
Read the book CISSP All-in-One Study Guide and can refer to this URL https://www.soterosoft.com/blog/data-in-use-encryption-data-in-motion-encryption/ data-in-use - Encryption doesn’t protect data in use. Data-in-use meaning the data already view example displaying your bank account information at your screen. The data is encrypted at the source (Data-at-rest encryption), the data is encrypted via TLS or HTTPS when in motion. But when it reaches your computer or mobile devices, the data storing in your RAM, CPU registeres and display on your screen. All these are not encrypted, else how you read the data or information?? Data must decrypt before it is used. So for data-in-use, best approach is access control but that doesnt stop people from screen-shot and print it etc etc. So the obvious answer is B.
upvoted 9 times
jackdryan
1 year, 6 months ago
B is correct
upvoted 1 times
...
rdy4u
2 years ago
Good point. I will go with B.
upvoted 1 times
...
Jamati
2 years ago
B is correct but I'd just like to add that with Homomorphic encryption the data in use is protected as well. Homomorphic encryption is a form of encryption that permits users to perform computations on its encrypted data without first decrypting it.
upvoted 2 times
...
...
CCNPWILL
Most Recent 5 months, 4 weeks ago
Selected Answer: B
Correct Answer is B. You dont use secure protocols to ' view ' ... but you do need proper AuthZ to view files. read words carefully.
upvoted 1 times
...
stack120566
8 months, 1 week ago
correct answer is C .. A and D align more with data at rest., the protocols mentioned in C aligns with data in transit
upvoted 1 times
...
gjimenezf
10 months, 1 week ago
Selected Answer: B
B is the only data in use, others are data at rest and data in transit
upvoted 1 times
...
KCLung
1 year, 1 month ago
Why the answer is B? If someone take the mobile phone to take the photo, it can also be printed. It does not make sense.
upvoted 1 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: B
"data in use" is one of three states of data. In this question "data in use" should have been printed without dashes (not "data-in-use").
upvoted 1 times
...
syyt
1 year, 7 months ago
Selected Answer: B
Answer is B. Secure protocols don't protect against local access while access controls do. .
upvoted 1 times
...
DJOEK
1 year, 10 months ago
Selected Answer: B
The correct answer according to CISSP is: B. When the data is being viewed, it can only be printed by authorized users. Data-in-use controls are a type of security control that is designed to protect data when it is being accessed or used. These controls typically involve limiting the actions that can be performed on the data and enforcing access controls to ensure that only authorized users are able to view, modify, or print the data. This way, it ensures that only authorized users can print the data and not to anyone who has access to the data.
upvoted 4 times
...
evenkeel
1 year, 10 months ago
C. A protocol is a procedure, not necessarily referencing a method of encryption. Could be referencing a protocol for clean desk policy, or privacy screens.
upvoted 1 times
...
oudmaster
1 year, 11 months ago
Selected Answer: B
when I read option C "it can be accessed using secure protocols.", I thought about access remotely over TLS which will be a correct answer. But the question does not mention remote access to the data. So B should be the correct answer.
upvoted 1 times
...
rajkamal0
1 year, 11 months ago
Selected Answer: B
I go with B.
upvoted 1 times
...
ringoru
1 year, 11 months ago
Selected Answer: B
Answer is B. The question about the controls process. So, the answer should be very defined like example "it can only be printed by authorized users." Notice the word "only"?
upvoted 1 times
...
WiDeBarulho
2 years, 1 month ago
Selected Answer: C
Anyone can find a workaround to printing data they're not allowed to. HOW that data is accessed is the most important control.
upvoted 1 times
...
Rollizo
2 years, 1 month ago
Selected Answer: C
it is C. Data-in-use must work always of course with secure protocols when the information is charged in the system. After that, the information can be decrypted or not (homomorphic encryption). As well, the information should be accessed from trusted system or "enclave"
upvoted 3 times
...
krassko
2 years, 2 months ago
Selected Answer: C
I would say it's C > "Encryption plays a major role in protecting data in use or in motion. Data should always be encrypted when it's traversing any external or internal networks. This includes encrypting all data prior to transport or using protected tunnels, such as HTTPS or SSL/TLS." https://www.techtarget.com/searchsecurity/feature/Best-practices-to-secure-data-at-rest-in-use-and-in-motion It's not A, when you lose data in use you can decrypt them. Imagin that you are connected over TLS to your bank and you close the browser, can you reopen that, no you have to login again with secure protocol (TLS).
upvoted 3 times
...
DERCHEF2009
2 years, 2 months ago
Selected Answer: A
Encryption. Its A
upvoted 2 times
oudmaster
1 year, 11 months ago
Data in use cannot be encrypted.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...