Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CISM Topic 4 Question 72 Discussion

Actual exam question for Isaca's CISM exam
Question #: 72
Topic #: 4
[All CISM Questions]

An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.

Which of the following should be given immediate focus?

Show Suggested Answer Hide Answer
Suggested Answer: C

Data encryption standards are the best information security initiative for creating an enterprise strategy for protecting data across multiple data repositories and different departments because they help to ensure the confidentiality, integrity, and availability of data in transit and at rest. Data encryption is a process of transforming data into an unreadable format using a secret key or algorithm, so that only authorized parties can access and decrypt it. Data encryption standards are the rules or specifications that define how data encryption should be performed, such as the type, strength, and mode of encryption, the key management and distribution methods, and the compliance requirements. Data encryption standards help to protect data from unauthorized access, modification, or theft, as well as to meet the regulatory obligations for data privacy and security. Therefore, data encryption standards are the correct answer.


https://www.techtarget.com/searchdatabackup/tip/20-keys-to-a-successful-enterprise-data-protection-strategy

https://cloudian.com/guides/data-protection/data-protection-strategy-10-components-of-an-effective-strategy/

https://www.veritas.com/information-center/enterprise-data-protection

Contribute your Thoughts:

Jamika
1 months ago
Zero trust access model? More like zero common sense, amirite? Just give everyone a tin can and a piece of string, that's the real remote access security solution!
upvoted 0 times
Ardella
2 days ago
A) Moving to a zero trust access model
upvoted 0 times
...
...
Olen
1 months ago
Strengthening endpoint security is definitely the way to go. I mean, what's the point of having a fancy security system if your employees are just using their grandma's ancient laptop to access sensitive data?
upvoted 0 times
Herman
7 days ago
C) Enhancing cyber response capability
upvoted 0 times
...
Tijuana
11 days ago
B) Enabling network-level authentication
upvoted 0 times
...
Cherri
15 days ago
A) Moving to a zero trust access model
upvoted 0 times
...
...
Richelle
2 months ago
Enhancing the cyber response capability is important, but it won't do much good if the initial security measures aren't in place. Gotta start with the basics first.
upvoted 0 times
Franchesca
17 days ago
C) Enhancing cyber response capability
upvoted 0 times
...
Holley
18 days ago
B) Enabling network-level authentication
upvoted 0 times
...
Ciara
20 days ago
A) Moving to a zero trust access model
upvoted 0 times
...
...
Judy
2 months ago
I'm not sure network-level authentication is the best option. With everyone working remotely, endpoint security should be the top priority to protect those devices from potential threats.
upvoted 0 times
Julianna
7 days ago
D) Strengthening endpoint security
upvoted 0 times
...
Annice
13 days ago
D) Strengthening endpoint security
upvoted 0 times
...
Kimberlie
15 days ago
C) Enhancing cyber response capability
upvoted 0 times
...
Mertie
24 days ago
B) Enabling network-level authentication
upvoted 0 times
...
Catrice
30 days ago
B) Enabling network-level authentication
upvoted 0 times
...
Laura
1 months ago
A) Moving to a zero trust access model
upvoted 0 times
...
Celeste
1 months ago
A) Moving to a zero trust access model
upvoted 0 times
...
...
Portia
2 months ago
A zero trust access model seems like the way to go here. It's all about verifying every user and device before allowing access, which is crucial for remote work security.
upvoted 0 times
Jimmie
2 months ago
User 2: Absolutely, verifying every user and device is key to preventing unauthorized access.
upvoted 0 times
...
Donette
2 months ago
User 1: I agree, a zero trust access model would definitely help in ensuring secure remote access.
upvoted 0 times
...
...
Paulene
2 months ago
I believe enhancing cyber response capability is also important in this situation.
upvoted 0 times
...
Deandrea
2 months ago
I agree with Sabrina. Zero trust access model can help secure remote access better.
upvoted 0 times
...
Sabrina
2 months ago
I think we should focus on moving to a zero trust access model.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77