Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CISM Topic 5 Question 86 Discussion

Actual exam question for Isaca's CISM exam
Question #: 86
Topic #: 5
[All CISM Questions]

Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?

Show Suggested Answer Hide Answer
Suggested Answer: A

Compartmentalization is the best defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns because it is a strategy that divides the network or system into smaller segments or compartments, each with its own security policies, controls, and access rules. Compartmentalization helps to isolate and protect the most sensitive or critical data and functions from unauthorized or malicious access, as well as to limit the damage or impact of a breach or compromise. Compartmentalization also helps to enforce the principle of least privilege, which grants users or processes only the minimum access rights they need to perform their tasks. Therefore, compartmentalization is the correct answer.


https://www.csoonline.com/article/3667476/defense-in-depth-explained-layering-tools-and-processes-for-better-security.html

https://www.fortinet.com/resources/cyberglossary/defense-in-depth

https://sciencepublishinggroup.com/journal/paperinfo?journalid=542&doi=10.11648/j.ajai.20190302.11

Contribute your Thoughts:

Valentine
8 months ago
Compartmentalization? I'd rather compartmentalize my snacks during my security breaks.
upvoted 0 times
Curt
7 months ago
C) Continuous monitoring
upvoted 0 times
...
Britt
7 months ago
D) Multi-factor authentication
upvoted 0 times
...
Elenora
8 months ago
A) Compartmentalization
upvoted 0 times
...
...
Junita
8 months ago
Multi-factor authentication? More like multi-factor annoyance! But hey, it works, I guess.
upvoted 0 times
...
Margot
8 months ago
Continuous monitoring, it's the only way to stay one step ahead of those pesky hackers.
upvoted 0 times
Jaime
7 months ago
D) Multi-factor authentication
upvoted 0 times
...
Ronny
7 months ago
C) Continuous monitoring
upvoted 0 times
...
Shakira
7 months ago
B) Overlapping redundancy
upvoted 0 times
...
Tamekia
8 months ago
A) Compartmentalization
upvoted 0 times
...
...
Isaiah
8 months ago
Overlapping redundancy, baby! Can't have too many layers of security, am I right?
upvoted 0 times
Hyun
7 months ago
D) Multi-factor authentication
upvoted 0 times
...
Lyndia
7 months ago
C) Continuous monitoring
upvoted 0 times
...
Timothy
8 months ago
B) Overlapping redundancy
upvoted 0 times
...
Arthur
8 months ago
A) Compartmentalization
upvoted 0 times
...
...
Lou
9 months ago
I agree with Chandra, compartmentalization helps to limit the impact of a security breach.
upvoted 0 times
...
Dorthy
9 months ago
I personally believe that multi-factor authentication is the best option, as it adds an extra layer of security.
upvoted 0 times
...
Leoma
9 months ago
Compartmentalization all the way! Gotta keep those high-value assets locked down tight.
upvoted 0 times
Yasuko
8 months ago
C) Continuous monitoring
upvoted 0 times
...
Chi
8 months ago
D) Multi-factor authentication
upvoted 0 times
...
Antonio
8 months ago
A) Compartmentalization
upvoted 0 times
...
...
Chandra
9 months ago
I think the best defense-in-depth implementation is compartmentalization.
upvoted 0 times
...

Save Cancel