New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISM Exam - Topic 4 Question 72 Discussion

Actual exam question for Isaca's CISM exam
Question #: 72
Topic #: 4
[All CISM Questions]

An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.

Which of the following should be given immediate focus?

Show Suggested Answer Hide Answer
Suggested Answer: C

Data encryption standards are the best information security initiative for creating an enterprise strategy for protecting data across multiple data repositories and different departments because they help to ensure the confidentiality, integrity, and availability of data in transit and at rest. Data encryption is a process of transforming data into an unreadable format using a secret key or algorithm, so that only authorized parties can access and decrypt it. Data encryption standards are the rules or specifications that define how data encryption should be performed, such as the type, strength, and mode of encryption, the key management and distribution methods, and the compliance requirements. Data encryption standards help to protect data from unauthorized access, modification, or theft, as well as to meet the regulatory obligations for data privacy and security. Therefore, data encryption standards are the correct answer.


https://www.techtarget.com/searchdatabackup/tip/20-keys-to-a-successful-enterprise-data-protection-strategy

https://cloudian.com/guides/data-protection/data-protection-strategy-10-components-of-an-effective-strategy/

https://www.veritas.com/information-center/enterprise-data-protection

Contribute your Thoughts:

0/2000 characters
Gail
3 months ago
Wait, are we really just now considering zero trust? That’s wild!
upvoted 0 times
...
Ranee
3 months ago
Enhancing cyber response capability seems a bit too late, don’t you think?
upvoted 0 times
...
Nidia
3 months ago
Endpoint security is crucial right now!
upvoted 0 times
...
Clemencia
4 months ago
I think network-level authentication should be prioritized.
upvoted 0 times
...
Dortha
4 months ago
Zero trust access model is a must!
upvoted 0 times
...
Roslyn
4 months ago
Strengthening endpoint security seems like a solid choice, but I recall a practice question where zero trust was emphasized as a priority.
upvoted 0 times
...
Virgina
4 months ago
I feel like enhancing cyber response capability is important too, but I wonder if it should come after securing access first.
upvoted 0 times
...
Jacinta
4 months ago
I think enabling network-level authentication could be crucial right now, especially since everyone is working remotely.
upvoted 0 times
...
Vivan
5 months ago
I remember we discussed zero trust models in class, but I'm not entirely sure if that's the best immediate focus.
upvoted 0 times
...
Georgeanna
5 months ago
Zero trust access is the way to go here. It provides the most comprehensive security for remote work by verifying every user and device, not just the network.
upvoted 0 times
...
Alexis
5 months ago
I'm a bit confused on the differences between the options. Can someone explain the pros and cons of each approach? I want to make sure I pick the right one.
upvoted 0 times
...
Evelynn
5 months ago
Definitely go with option A - zero trust access. That's the best way to quickly secure remote connections without relying on traditional network perimeter defenses.
upvoted 0 times
...
Mari
5 months ago
Hmm, I'm not sure about this one. I'm debating between the zero trust model and strengthening endpoint security. Both seem important for remote work security.
upvoted 0 times
...
Leah
5 months ago
This one seems pretty straightforward. I'd say the immediate focus should be on moving to a zero trust access model to secure remote access.
upvoted 0 times
...
Sharmaine
5 months ago
I'm leaning towards Part VI: TOGAF Reference Models. That's where TOGAF provides the detailed reference models and information on the underlying metamodel, so that seems like the most relevant section.
upvoted 0 times
...
Ashanti
5 months ago
Okay, I've got this. Efficiency, usability, and compatibility are all characteristics of quality in use according to ISO 25010. I'm confident that's the right answer.
upvoted 0 times
...
Jamika
9 months ago
Zero trust access model? More like zero common sense, amirite? Just give everyone a tin can and a piece of string, that's the real remote access security solution!
upvoted 0 times
Gayla
8 months ago
D) Strengthening endpoint security
upvoted 0 times
...
Renay
8 months ago
C) Enhancing cyber response capability
upvoted 0 times
...
Becky
8 months ago
B) Enabling network-level authentication
upvoted 0 times
...
Ardella
8 months ago
A) Moving to a zero trust access model
upvoted 0 times
...
...
Olen
9 months ago
Strengthening endpoint security is definitely the way to go. I mean, what's the point of having a fancy security system if your employees are just using their grandma's ancient laptop to access sensitive data?
upvoted 0 times
Herman
8 months ago
C) Enhancing cyber response capability
upvoted 0 times
...
Tijuana
9 months ago
B) Enabling network-level authentication
upvoted 0 times
...
Cherri
9 months ago
A) Moving to a zero trust access model
upvoted 0 times
...
...
Richelle
10 months ago
Enhancing the cyber response capability is important, but it won't do much good if the initial security measures aren't in place. Gotta start with the basics first.
upvoted 0 times
Franchesca
9 months ago
C) Enhancing cyber response capability
upvoted 0 times
...
Holley
9 months ago
B) Enabling network-level authentication
upvoted 0 times
...
Ciara
9 months ago
A) Moving to a zero trust access model
upvoted 0 times
...
...
Judy
10 months ago
I'm not sure network-level authentication is the best option. With everyone working remotely, endpoint security should be the top priority to protect those devices from potential threats.
upvoted 0 times
Julianna
8 months ago
D) Strengthening endpoint security
upvoted 0 times
...
Annice
9 months ago
D) Strengthening endpoint security
upvoted 0 times
...
Kimberlie
9 months ago
C) Enhancing cyber response capability
upvoted 0 times
...
Mertie
9 months ago
B) Enabling network-level authentication
upvoted 0 times
...
Catrice
9 months ago
B) Enabling network-level authentication
upvoted 0 times
...
Laura
10 months ago
A) Moving to a zero trust access model
upvoted 0 times
...
Celeste
10 months ago
A) Moving to a zero trust access model
upvoted 0 times
...
...
Portia
10 months ago
A zero trust access model seems like the way to go here. It's all about verifying every user and device before allowing access, which is crucial for remote work security.
upvoted 0 times
Jimmie
10 months ago
User 2: Absolutely, verifying every user and device is key to preventing unauthorized access.
upvoted 0 times
...
Donette
10 months ago
User 1: I agree, a zero trust access model would definitely help in ensuring secure remote access.
upvoted 0 times
...
...
Paulene
10 months ago
I believe enhancing cyber response capability is also important in this situation.
upvoted 0 times
...
Deandrea
11 months ago
I agree with Sabrina. Zero trust access model can help secure remote access better.
upvoted 0 times
...
Sabrina
11 months ago
I think we should focus on moving to a zero trust access model.
upvoted 0 times
...

Save Cancel