Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 226 discussion

Actual exam question from ISC's CISSP
Question #: 226
Topic #: 1
[All CISSP Questions]

When network management is outsourced to third parties, which of the following is the MOST effective method of protecting critical data assets?

  • A. Confirm that confidentiality agreements are signed
  • B. Employ strong access controls
  • C. Log all activities associated with sensitive systems
  • D. Provide links to security policies
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Logan3003
Highly Voted 2 years, 1 month ago
question ask for "most effective method". disgruntled employee/malicious insider cannot stop by an NDA. answer given is correct.
upvoted 10 times
jackdryan
1 year, 6 months ago
B is correct
upvoted 2 times
...
...
CCNPWILL
Most Recent 5 months, 4 weeks ago
Selected Answer: B
which of the following is the MOST effective method of protecting critical data assets? B. Employ strong access controls Its the most effective. its taking action to protect data.
upvoted 1 times
...
homeysl
1 year, 1 month ago
Selected Answer: B
B is correct. Other options won't stop a determined individual from accessing sensitive data.
upvoted 1 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: B
B. Employ strong access controls is the MOST effective method of protecting critical data assets when network management is outsourced to third parties. Strong access controls ensure that only authorized personnel can access the critical data assets, reducing the risk of unauthorized access and data breaches. While confirming confidentiality agreements, logging all activities associated with sensitive systems, and providing links to security policies are also important measures, they may not be as effective as employing strong access controls.
upvoted 1 times
...
HughJassole
1 year, 5 months ago
The question asks about network management being outsourced and then asking how to secure data. So the data is not outsourced, what is outsourced is who and how your network is run. "Network outsourcing is a multiyear or annuity contract/relationship involving the purchase of ongoing network or telecom management services for managing, enhancing, maintaining and supporting premises or core network infrastructure or enterprise telecommunications assets (including fixed and wireless)" https://www.gartner.com/en/information-technology/glossary/network-outsourcing-enterprise-and-public-network It seems that they are trying to confuse you with this info. The question is really about how to secure data, and B is the answer.
upvoted 1 times
...
DJOEK
1 year, 10 months ago
Selected Answer: B
The MOST effective method of protecting critical data assets when network management is outsourced to third parties is to employ strong access controls. This includes implementing measures such as authentication, authorization, and access control mechanisms to ensure that only authorized users have access to the data. Confirming that confidentiality agreements are signed and logging all activities associated with sensitive systems can also help to protect the data, but strong access controls are the most important measure to ensure that only authorized users can access the data. Providing links to security policies can help to educate users about the importance of protecting data, but it is not sufficient on its own to protect the data.
upvoted 2 times
...
rajkamal0
1 year, 11 months ago
Selected Answer: B
B is the best answer.
upvoted 1 times
...
oudmaster
1 year, 11 months ago
Selected Answer: B
Option A is an NDA (non-disclosure agreement), which I dont see it applicable. The question mentioned "protecting critical data assets" which means it seeks a technical control, not administrative. I vote for B.
upvoted 2 times
...
BP_lobster
2 years ago
Selected Answer: B
Only option B can actively prevent access. Hence fits the "most effective method" criteria.
upvoted 1 times
...
IXone
2 years ago
Selected Answer: B
I agree with B
upvoted 3 times
...
IXone
2 years ago
I agree with B
upvoted 2 times
...
CuteRabbit168
2 years, 1 month ago
Selected Answer: B
Access controls will prevent the third party vendor from accessing data that they are not allowed to access. An NDA does not protect data. B is the best answer.
upvoted 3 times
...
BDSec
2 years, 2 months ago
Selected Answer: A
You are providing them with access, so B isn't the best option. It's A.
upvoted 3 times
...
krassko
2 years, 2 months ago
Selected Answer: A
A and B are good. But from management point of view it's A.
upvoted 4 times
franbarpro
2 years, 1 month ago
Am sure to be a manager of infosec you have to know some technical. So, I am thinking like a manager and going with "B"
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...