Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 267 discussion

Actual exam question from ISC's CISSP
Question #: 267
Topic #: 1
[All CISSP Questions]

A systems engineer is designing a wide area network (WAN) environment for a new organization. The WAN will connect sites holding information at various levels of sensitivity, from publicly available to highly confidential. The organization requires a high degree of interconnectedness to support existing business processes.
What is the BEST design approach to securing this environment?

  • A. Use reverse proxies to create a secondary "shadow" environment for critical systems.
  • B. Place firewalls around critical devices, isolating them from the rest of the environment.
  • C. Layer multiple detective and preventative technologies at the environment perimeter.
  • D. Align risk across all interconnected elements to ensure critical threats are detected and handled.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Voxycs
Highly Voted 1 year, 1 month ago
Selected Answer: D
Think like a manager/consultant. Choose a process over technical implementation.
upvoted 8 times
...
DERCHEF2009
Highly Voted 2 years, 2 months ago
Selected Answer: D
Going with D
upvoted 8 times
...
klarak
Most Recent 6 months, 2 weeks ago
D is a gimme. It's the only thing that's comprehensive. It's not about just picking one technical protection over another.
upvoted 1 times
...
eboehm
7 months, 2 weeks ago
Selected Answer: D
at first I thought the answer was C, but then there are a couple things to think about. The first is that it says only at the perimeter. Second is it only mentions preventive and detective controls. When properly implementing layered defense it should include a complete control (detective, preventive, and recovery)
upvoted 1 times
...
gjimenezf
10 months, 1 week ago
Selected Answer: C
multi-layered defense in depth is the best DESIGN
upvoted 1 times
...
YesPlease
11 months, 2 weeks ago
Selected Answer: D
Answer D) Think like a manager. A, B, and C are all technical approaches and may not be the best solution for each network joined to the WAN. D is the only one that will look across all systems and create something that addresses them all.
upvoted 1 times
Woo7
9 months, 3 weeks ago
But the question is asking what is the best design approach for the system's engineer, not the manager. Not saying this is wrong, just debating myself
upvoted 1 times
...
...
[Removed]
11 months, 3 weeks ago
Selected Answer: C
Depending on the reading, you can fit all the answers. Security recommends a multi-layered defense, so I choose C. By the way, those in the C camp, switch to the voting comments after selecting your answer and then leave a comment. The D camp is doing a solid job of voting, aren't they?
upvoted 1 times
...
InclusiveSTEAM
1 year, 1 month ago
The answer is D Explain: Since high interconnectedness is required, attempting to isolate systems or create separate environments is not feasible. Instead, a unified risk-based approach should be taken to implement layered controls prioritized based on criticality across all systems and tiers. This allows tailoring security to system criticality while still enabling connectivity through integrating compensating controls. Options A and B take an isolation approach that hinders integration. Option C proposes just hardened perimeters rather than alignment across assets.
upvoted 3 times
...
[Removed]
1 year, 3 months ago
Selected Answer: C
"Layered" = Defense in Depth. I think that is the point of the question.
upvoted 1 times
...
Meowson
1 year, 4 months ago
This is CISSP, not some technical exams, the answer is D for sure.
upvoted 2 times
...
jegga
1 year, 6 months ago
C is the best answer - If the organization requires a high degree of interconnectedness, definitely defence in is required for seamless connectivity of all sites.
upvoted 1 times
...
Moose01
1 year, 6 months ago
C. Perimeter FW or Router that can simple ACL will be able to accomplish this very easily. ACL will permit only what is allowed in and prevent what is not. if it is FW, even better. Defense in Depth - will add all the above Router, FW, IDS, Group Policy if part AD.
upvoted 1 times
...
Oscar_Law
1 year, 6 months ago
Selected Answer: B
B is correct
upvoted 1 times
...
JohnyDal
1 year, 9 months ago
Selected Answer: C
C includes A,B,D
upvoted 2 times
jackdryan
1 year, 6 months ago
B is correct
upvoted 1 times
...
...
oudmaster
1 year, 11 months ago
Selected Answer: C
I vote for C. Use layered security such as, IPS, IDS, WAF, FW, AI/MC, etc, at the perimeter level. So this will make sure traffic destined to critical assets will be properly inspected. Firewall at the end is not advanced security solutions.
upvoted 1 times
...
DracoL
2 years, 1 month ago
Selected Answer: B
B should be the correct answer - Place firewalls around critical devices, isolating them from the rest of the environment. Key words is firewall around critical devices and isolation meaning physical/virtual segmentation. Not neccesary just DMZ, it can be multi-layer segment, i.e level 0 that has access to the WAN. From level 0 to level 1 need to pass through an firewall etc. This is typical design for some secure site.
upvoted 3 times
...
BDSec
2 years, 2 months ago
Selected Answer: B
B. Perimeter doesn’t factor need for internal protection
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...