exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 250 discussion

Actual exam question from ISC's CISSP
Question #: 250
Topic #: 1
[All CISSP Questions]

In an IDEAL encryption system, who has sole access to the decryption key?

  • A. Data custodian
  • B. System owner
  • C. System administrator
  • D. Data owner
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Watcher009
Highly Voted 4 months, 3 weeks ago
Selected Answer: D
IDEAL stands for Informational Disclosure Avoidance Language, a privacy framework used by the United States Census Bureau. In an IDEAL encryption system, sensitive data is encrypted to prevent unauthorized access or disclosure. The data owner is responsible for controlling access to the encryption key, which is used to decrypt the data.
upvoted 7 times
jackdryan
3 months, 4 weeks ago
D is correct
upvoted 1 times
...
...
emrys
Most Recent 6 months ago
Selected Answer: D
D is correct
upvoted 1 times
...
RVoigt
7 months ago
Selected Answer: A
CISSP Official Study Guide pg 213 - "Know the responsibilities of data roles. The data owner is the person responsible for classifying, labeling, and protecting data. System owners are responsible for the systems that process the data. ... A custodian has day-to-day responsibilities for protecting and storing data. "
upvoted 1 times
...
DJOEK
8 months ago
Selected Answer: D
The data owner is the person or organization that has created, owns or is responsible for the data, and they might have the interest in protecting the data integrity, confidentiality and availability. They might also have the right to decide who can access their data, and therefore they might be responsible for the decryption key. In some scenarios the data owner and the data custodian are the same person or entity, but in others the data owner could have access to the encryption key, they can delegate it to a data custodian or to a specific person or team to manage it.
upvoted 1 times
...
franbarpro
10 months, 3 weeks ago
I mean they are the ones that work with the data! So, yea "D".
upvoted 3 times
...
JAckThePip
11 months, 1 week ago
Answer is correct https://www.cloudmask.com/blog/where-are-your-encryption-keys-and-who-has-control-over-them
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago