Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CISSP topic 1 question 200 discussion

Actual exam question from ISC's CISSP
Question #: 200
Topic #: 1
[All CISSP Questions]

What BEST describes the confidentiality, integrity, availability triad?

  • A. A vulnerability assessment to see how well the organization's data is protected
  • B. The three-step approach to determine the risk level of an organization
  • C. The implementation of security systems to protect the organization's data
  • D. A tool used to assist in understanding how to protect the organization's data
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
stickerbush1970
Highly Voted 1 year, 9 months ago
Selected Answer: C
CIA is all about Data and access to it. I don't have a good reason for C, however I would go C by elimination of the others, B doesn't have the word data in the answer, CIA is not an vulnerability assessment, and CIA isn't a tool.
upvoted 9 times
jackdryan
1 year, 1 month ago
C is correct
upvoted 1 times
...
...
inmymind84
Highly Voted 1 year, 9 months ago
Selected Answer: D
Why it isnt D?
upvoted 8 times
maawar83
6 months, 1 week ago
it is not a tool
upvoted 1 times
eboehm
2 months, 4 weeks ago
yes it is. It is used to assist you in figuring out how to implement controls based on those 3 principles
upvoted 1 times
...
...
...
50e940e
Most Recent 1 week ago
Selected Answer: D
security systems did not mean program or framework. We may not develop systems to protect our data
upvoted 1 times
...
CCNPWILL
1 month, 1 week ago
C is the best option given the wording. deleted the other A and B based on just being way off.
upvoted 1 times
...
eboehm
2 months, 4 weeks ago
Selected Answer: D
Haha soooo many people on here have zero understanding of the word "tool" A tool is ANYTHING that would assist you with the implementation. This could be training, google, a manual, a model, a concept, a standard, CISSP certification, the list goes on. Hillarious how many think the CIA triad, an intangible construct that is only in our heads, is somehow an implementation of security controls
upvoted 1 times
...
gjimenezf
5 months, 3 weeks ago
Selected Answer: C
Data security
upvoted 1 times
...
SpaceMonkey1
7 months, 3 weeks ago
Selected Answer: D
Option C could be interpreted as implying that the confidentiality, integrity, and availability (CIA) triad refers to the implementation of security systems to protect an organization's data. While security systems are indeed employed to uphold these principles, the CIA triad itself is not a specific implementation or system but rather a foundational concept guiding security strategies. The CIA triad outlines three primary objectives essential to information security—ensuring data confidentiality, maintaining data integrity, and guaranteeing data availability. It's a principle or guideline used to shape the design, selection, and implementation of security measures and systems within an organization to protect its data and resources. Therefore, while security systems are implemented to align with the CIA triad, the triad itself represents the overarching principles rather than the specific tools or systems used for protection.
upvoted 3 times
...
74gjd_37
9 months, 2 weeks ago
Selected Answer: C
Among the given options, C best describes the CIA triad from a CISSP perspective as it highlights the implementation of security systems to safeguard and protect an organization's data.
upvoted 2 times
...
Nicola_2_Reg
9 months, 3 weeks ago
Selected Answer: D
The wording is not appropriate enough... I mean, D would be more accurate. CIA triad does not implement, it is a concept (moreless a immaterial tool to help CISOs).
upvoted 2 times
...
georgegeorge125487
10 months, 2 weeks ago
Selected Answer: A
A model (i.e. a sort of tool or approach) to manage security.
upvoted 1 times
...
dmo_d
1 year, 1 month ago
This is another language comprehension test. I interpreted "tool" as a metaphor for "something that helps", which could also apply to frameworks, models, etc. But obviously I was wrong. :-(
upvoted 1 times
...
SaintDaSinner
1 year, 4 months ago
Selected Answer: C
The CIA triad is widely accepted as a model "not a Tool" in information security.
upvoted 2 times
...
DJOEK
1 year, 6 months ago
Selected Answer: C
agree with stickerbush1970. No other reasoning
upvoted 2 times
...
rajkamal0
1 year, 6 months ago
Selected Answer: C
C is the correct answer. CIA Triad is not a tool.
upvoted 3 times
...
franbarpro
1 year, 8 months ago
Selected Answer: C
Given answer is correct - CIA is not a tool. It's a model used to secure systems (Protect organization's data).
upvoted 5 times
CuteRabbit168
1 year, 8 months ago
The CIA triad is a key tenet at the core of information security. This tool is used to help the information security professional think about how to best protect organizational data https://www.oreilly.com/library/view/information-security-handbook/9781788478830/f8ca030b-787f-40df-b46f-6febf47c013c.xhtml
upvoted 3 times
CuteRabbit168
1 year, 8 months ago
Answer is D
upvoted 1 times
...
Coolwater
1 year, 8 months ago
Its not a tool, its model https://www.fortinet.com/resources/cyberglossary/cia-triad#:~:text=The%20three%20letters%20in%20%22CIA%20triad%22%20stand%20for%20Confidentiality%2C%20Integrity%2C%20and%20Availability.%20The%20CIA%20triad%20is%20a%20common%20model%20that%20forms%20the%20basis%20for%20the%20development%20of%20security%20systems.%20They%20are%20used%20for%20finding%20vulnerabilities%20and%20methods%20for%20creating%20solutions.
upvoted 3 times
...
...
...
matt1976
1 year, 9 months ago
It is C. The CIA triad is a common model that forms the basis for the development of security systems.
upvoted 4 times
...
CuteRabbit168
1 year, 9 months ago
Selected Answer: D
Obvious this is the answer
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
ex Want to SAVE BIG on Certification Exam Prep?
close
ex Unlock All Exams with ExamTopics Pro 75% Off
  • arrow Choose From 1000+ Exams
  • arrow Access to 10 Exams per Month
  • arrow PDF Format Available
  • arrow Inline Discussions
  • arrow No Captcha/Robot Checks
Limited Time Offer
Ends in