Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 366 discussion

Actual exam question from ISC's CISSP
Question #: 366
Topic #: 1
[All CISSP Questions]

A firm within the defense industry has been directed to comply with contractual requirements for encryption of a government client's Controlled Unclassified
Information (CUI). What encryption strategy represents how to protect data at rest in the MOST efficient and cost-effective manner?

  • A. Perform logical separation of program information, using virtualized storage solutions with encryption management in the back-end disk systems
  • B. Perform logical separation of program information, using virtualized storage solutions with built-in encryption at the virtualization layer
  • C. Perform physical separation of program information and encrypt only information deemed critical by the defense client
  • D. Implement data at rest encryption across the entire storage area network (SAN)
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
rdy4u
Highly Voted 2 years ago
Selected Answer: D
Controlled Unclassified Information - Encryption of Data at Rest In accordance with DoD policy, all unclassified DoD data that has not been approved for public release and is stored on mobile computing devices or removable storage media must be encrypted using commercially available encryption technology. https://www.stigviewer.com/stig/traditional_security_checklist/2020-08-26/finding/V-32263
upvoted 6 times
...
aaminenaji
Most Recent 1 month ago
Selected Answer: B
Compared to other options B strikes a balance between comprehensive protection and operational efficiency
upvoted 1 times
...
deeden
3 months, 1 week ago
Selected Answer: A
D. strong protection but may be more expensive and complex to implement and manage. It may also introduce performance overhead, especially if the encryption is not optimized for the storage infra. C. can be costly and complex to implement, especially when dealing with large volumes. B. might add complexity and overhead to the virtualized environment. may require more resources to manage encryption keys and processes within the virtualization layer, making it potentially less efficient and more costly. A. This approach allows for centralized encryption management, which can be more efficient than encrypting at multiple layers. It also leverages existing storage infra and adds encryption at the back-end, reducing complexity and cost. This strategy effectively protects data at rest while allowing for flexibility and scalability.
upvoted 1 times
deeden
3 months, 1 week ago
Examples: - NetApp ONTAP - Dell EMC PowerMax - IBM DS8000 Series - Hitachi Virtual Storage Platform (VSP) - HPE 3PAR StoreServ - Pure Storage FlashArray
upvoted 1 times
...
...
gjimenezf
9 months, 4 weeks ago
Selected Answer: B
Best performance while cost efficient, B. D is not best performance, encrypting everything never is
upvoted 1 times
...
InclusiveSTEAM
1 year, 1 month ago
the most efficient and cost-effective encryption strategy for data at rest would be: B) Perform logical separation of program information, using virtualized storage solutions with built-in encryption at the virtualization layer The rationale is: Option A would require additional backend disk encryption systems, increasing cost and complexity. Option C risks missing critical information deemed non-critical by the client. Option D encrypts everything, even non-critical data, driving up processing overhead. Option B provides logical separation and encryption using capabilities already built into the virtualization platform. This avoids the need for expensive new backend encryption systems (A) or full encryption (D). Encryption occurs at the virtualization layer, providing efficient and secure separation of the client's sensitive data. -Claude 2.0
upvoted 4 times
maawar83
11 months ago
Here's how it typically works: The Answer Should be A: (Most Efficient and Cost) - B depends on the implementation (it could be shared disk) Virtualized Storage Layer: The virtualized storage layer manages and abstracts the storage resources for virtual machines or applications. Encryption at the Back-End Disk Systems: The actual data is stored on physical disks, and the encryption is applied at this layer. The back-end disk systems handle the encryption of data as it is written to the storage media.
upvoted 1 times
...
...
Voxycs
1 year, 1 month ago
Selected Answer: A
This option offers an efficient way to segregate and manage CUI by utilizing virtualization and relying on backend disk systems for encryption, which can centralize and streamline encryption management.
upvoted 2 times
...
DapengZhang
1 year, 7 months ago
Selected Answer: B
C, only client end information being encrypted is not sufficient. D. SAN is quite expansive and not matched with question requirement. Compare to A, B is better since it considers both program/application and data storage.
upvoted 3 times
jackdryan
1 year, 6 months ago
D is correct
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...