Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CISM Topic 4 Question 80 Discussion

Actual exam question for Isaca's CISM exam
Question #: 80
Topic #: 4
[All CISM Questions]

Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?

Show Suggested Answer Hide Answer
Suggested Answer: C

Data encryption standards are the best information security initiative for creating an enterprise strategy for protecting data across multiple data repositories and different departments because they help to ensure the confidentiality, integrity, and availability of data in transit and at rest. Data encryption is a process of transforming data into an unreadable format using a secret key or algorithm, so that only authorized parties can access and decrypt it. Data encryption standards are the rules or specifications that define how data encryption should be performed, such as the type, strength, and mode of encryption, the key management and distribution methods, and the compliance requirements. Data encryption standards help to protect data from unauthorized access, modification, or theft, as well as to meet the regulatory obligations for data privacy and security. Therefore, data encryption standards are the correct answer.


https://www.techtarget.com/searchdatabackup/tip/20-keys-to-a-successful-enterprise-data-protection-strategy

https://cloudian.com/guides/data-protection/data-protection-strategy-10-components-of-an-effective-strategy/

https://www.veritas.com/information-center/enterprise-data-protection

Contribute your Thoughts:

Aide
1 months ago
Independent assessment, huh? Sounds like a fancy way of saying 'pass the buck'. But hey, if it's the right move, I'm all for it. Gotta cover all our bases when it comes to security.
upvoted 0 times
Diane
4 days ago
Enforce the organization's information security policy.
upvoted 0 times
...
Denise
18 days ago
Obtain legal guidance.
upvoted 0 times
...
Norah
19 days ago
Enforce the organization's information security policy.
upvoted 0 times
...
...
Antonette
1 months ago
Hmm, this one's a head-scratcher. I'd be tempted to just enforce the org's security policy, but I guess that could get me in trouble with the local authorities. Gotta play it safe and get that legal advice first.
upvoted 0 times
Ling
21 hours ago
User 2: No, we should definitely obtain legal guidance first.
upvoted 0 times
...
Beatriz
11 days ago
User 1: I think we should enforce the organization's information security policy.
upvoted 0 times
...
...
Jacki
2 months ago
I agree with Elza, getting legal advice is crucial in this situation.
upvoted 0 times
...
Ramonita
2 months ago
Haha, this is the kind of question that keeps security managers up at night. I'd say let's go with option B and get some legal input. Wouldn't want to end up in hot water over a policy clash!
upvoted 0 times
Catarina
28 days ago
Definitely, we need to make sure we're on solid legal ground.
upvoted 0 times
...
Salena
2 months ago
I agree, legal guidance is crucial in these situations.
upvoted 0 times
...
...
Pura
2 months ago
Whoa, talk about a tricky situation! Sounds like we've got a battle of the policies going on. I'd probably start by getting some legal guidance - can't be too careful with those local regulations, you know?
upvoted 0 times
...
Elza
2 months ago
I disagree, I believe we should obtain legal guidance to understand the implications.
upvoted 0 times
...
Jovita
2 months ago
I think we should enforce the local regulation first.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77