Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CISSP topic 1 question 18 discussion

Actual exam question from ISC's CISSP
Question #: 18
Topic #: 1
[All CISSP Questions]

Which of the following is the BEST way to protect an organization's data assets?

  • A. Encrypt data in transit and at rest using up-to-date cryptographic algorithms.
  • B. Monitor and enforce adherence to security policies.
  • C. Require Multi-Factor Authentication (MFA) and Separation of Duties (SoD).
  • D. Create the Demilitarized Zone (DMZ) with proxies, firewalls and hardened bastion hosts.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
godchild
Highly Voted 1 year, 10 months ago
policy vs encryption = management vs technical staff. Which is more important? I choose policy because CISSP needs you to think like a manager..
upvoted 29 times
wins34
4 months, 2 weeks ago
in option B . There is no clear indication as they are secure policies. So can't trust those policies if they are outdated.
upvoted 1 times
...
jackdryan
1 year, 2 months ago
B is correct
upvoted 3 times
...
franbarpro
1 year, 10 months ago
Having a hardtime to understand how "Security Policies" could be the BEST way to protect an organization's data assets. If we don't have technical controls in place - users tend to just do wheterver. Imagine having a policy that says change your password every 90 days. How many people will do that? But if GPO expires their password.... they will change it right way.
upvoted 6 times
N00b1e
1 year, 10 months ago
But if you don't have any policy to say when passwords should expire, would they never expire? Policy > Standards > Guidelines > Procedure
upvoted 8 times
...
DButtare
1 year, 9 months ago
Think like a manager buddy
upvoted 5 times
Ariel235788
8 months, 3 weeks ago
Technical controls come before administrative controls, Buddy
upvoted 1 times
Ramye
1 month, 1 week ago
And Policy comes first that dictates what technical controls need to be placed, Buddy :-)
upvoted 1 times
...
...
...
FredDurst
1 year, 8 months ago
SOLID B .... it's more like changing the culture . Even if you use encryption at rest or in transit they can write the data down on a a sticky note , share their screen with third parties , use their cellphone and take snaps of their work computer with confidential data displayed , get hooked on a social engineering scam etc . It all boils down to the the people at the end of the day and their respect for the policy either through pure logic or out of fear of disciplinary actions (enforcement) .
upvoted 4 times
...
...
...
DButtare
Highly Voted 1 year, 9 months ago
Selected Answer: B
I'm for the "B", encryption is part of the policy.
upvoted 8 times
...
f270069
Most Recent 5 days, 5 hours ago
Selected Answer: A
CHAT GP
upvoted 1 times
...
50e940e
1 week, 1 day ago
Selected Answer: A
A is more specific. If the security policy outdated or even the policy is not developed yet?
upvoted 1 times
...
CCNPWILL
1 month ago
Selected Answer: B
B encompasses A. B is more comprehensive than A. B could include access control and other control measures not specific to integrity or the like.
upvoted 1 times
...
Hardrvkllr
2 months, 4 weeks ago
I feel it's B. Because you need to monitor and enforce. This includes due diligence and care. Security policy would tell you 5 W's. I'm going with B.
upvoted 1 times
...
CCNPWILL
3 months ago
Selected Answer: B
Correct Answer is B. all training suggests policy is typically the best answer. it may even encompass all of the rest of the less correct answers.
upvoted 1 times
...
Vasyamba1
3 months, 3 weeks ago
Selected Answer: B
I think the key word is ENFORCE adherence to security policies, as policies include not only encryption requirements but other things to protect data, acceptable use for instance.
upvoted 2 times
...
Kyanka
4 months ago
Selected Answer: B
Remember Rule #1 on the CISSP exam: Think like a manager. So I'm convinced it's B.
upvoted 1 times
...
Az900500
4 months, 1 week ago
Note the word data asset, not data itself, so B is the answer
upvoted 1 times
...
wins34
4 months, 2 weeks ago
in option B . There is no clear indication as they are secure policies. So can't trust those policies if they are outdated.
upvoted 1 times
...
JBAnalyst
6 months ago
Selected Answer: B
Encryption addresses the confidentiality . What about the integrity and availability of the data . . It should be policy
upvoted 2 times
...
GPrep
6 months ago
Selected Answer: B
encrypting the data at rest and in transit is great for those who are unauthorized. However, the question is not that specific, reading that it applies to all types of users (authorized and not). When accounting for this interpretation of the question, B makes more sense. Additionally, B doesn't JUST list having or monitoring a policy, it is specific to also say enforce which implies technical controls.
upvoted 1 times
...
ilan0000
6 months ago
Policy > Standards > Procedures > Guidelines CBK, 6th Edition, Figure 1.3
upvoted 1 times
...
YesPlease
7 months ago
Answer A) you can implement all the security policies you want, but something will happen sooner or later. If you encrypt everything first, then it provides the BEST protection against theft/loss.
upvoted 1 times
YesPlease
6 months, 1 week ago
I'm an idiot. The actual answer is B) Monitor and enforce adherence to security policies. This can include all of the other options.
upvoted 1 times
...
...
aape1
9 months, 1 week ago
Selected Answer: A
A, because you always pick the answer with humanless involvement when comes to security because human is not trustable. You learn this from Kelly Handerhan!
upvoted 3 times
...
Law88
9 months, 2 weeks ago
Selected Answer: A
The best way to protect an organization's data assets is not a single method, but a combination of multiple methods that address different aspects and layers of data security. However, among the four options given, the most comprehensive and effective one is A. Encrypt data in transit and at rest using up-to-date cryptographic algorithms. Option B. Monitor and enforce adherence to security policies is a good practice for ensuring compliance and awareness of data security standards and regulations, but it does not directly protect data from attacks or breaches.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
ex Want to SAVE BIG on Certification Exam Prep?
close
ex Unlock All Exams with ExamTopics Pro 75% Off
  • arrow Choose From 1000+ Exams
  • arrow Access to 10 Exams per Month
  • arrow PDF Format Available
  • arrow Inline Discussions
  • arrow No Captcha/Robot Checks
Limited Time Offer
Ends in