which of the following is the MOST effective method of protecting critical data assets?
B. Employ strong access controls
Its the most effective. its taking action to protect data.
B. Employ strong access controls is the MOST effective method of protecting critical data assets when network management is outsourced to third parties. Strong access controls ensure that only authorized personnel can access the critical data assets, reducing the risk of unauthorized access and data breaches. While confirming confidentiality agreements, logging all activities associated with sensitive systems, and providing links to security policies are also important measures, they may not be as effective as employing strong access controls.
The question asks about network management being outsourced and then asking how to secure data. So the data is not outsourced, what is outsourced is who and how your network is run.
"Network outsourcing is a multiyear or annuity contract/relationship involving the purchase of ongoing network or telecom management services for managing, enhancing, maintaining and supporting premises or core network infrastructure or enterprise telecommunications assets (including fixed and wireless)"
https://www.gartner.com/en/information-technology/glossary/network-outsourcing-enterprise-and-public-network
It seems that they are trying to confuse you with this info. The question is really about how to secure data, and B is the answer.
The MOST effective method of protecting critical data assets when network management is outsourced to third parties is to employ strong access controls. This includes implementing measures such as authentication, authorization, and access control mechanisms to ensure that only authorized users have access to the data. Confirming that confidentiality agreements are signed and logging all activities associated with sensitive systems can also help to protect the data, but strong access controls are the most important measure to ensure that only authorized users can access the data. Providing links to security policies can help to educate users about the importance of protecting data, but it is not sufficient on its own to protect the data.
Option A is an NDA (non-disclosure agreement), which I dont see it applicable.
The question mentioned "protecting critical data assets" which means it seeks a technical control, not administrative.
I vote for B.
Access controls will prevent the third party vendor from accessing data that they are not allowed to access. An NDA does not protect data. B is the best answer.
Am sure to be a manager of infosec you have to know some technical. So, I am thinking like a manager and going with "B"
upvoted 3 times
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Logan3003
Highly Voted 2 years, 1 month agojackdryan
1 year, 6 months agoCCNPWILL
Most Recent 5 months, 4 weeks agohomeysl
1 year, 1 month ago74gjd_37
1 year, 2 months agoHughJassole
1 year, 5 months agoDJOEK
1 year, 10 months agorajkamal0
1 year, 11 months agooudmaster
1 year, 11 months agoBP_lobster
2 years agoIXone
2 years agoIXone
2 years agoCuteRabbit168
2 years, 1 month agoBDSec
2 years, 2 months agokrassko
2 years, 2 months agofranbarpro
2 years, 1 month ago