New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISM Exam - Topic 5 Question 86 Discussion

Actual exam question for Isaca's CISM exam
Question #: 86
Topic #: 5
[All CISM Questions]

Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?

Show Suggested Answer Hide Answer
Suggested Answer: A

Compartmentalization is the best defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns because it is a strategy that divides the network or system into smaller segments or compartments, each with its own security policies, controls, and access rules. Compartmentalization helps to isolate and protect the most sensitive or critical data and functions from unauthorized or malicious access, as well as to limit the damage or impact of a breach or compromise. Compartmentalization also helps to enforce the principle of least privilege, which grants users or processes only the minimum access rights they need to perform their tasks. Therefore, compartmentalization is the correct answer.


https://www.csoonline.com/article/3667476/defense-in-depth-explained-layering-tools-and-processes-for-better-security.html

https://www.fortinet.com/resources/cyberglossary/defense-in-depth

https://sciencepublishinggroup.com/journal/paperinfo?journalid=542&doi=10.11648/j.ajai.20190302.11

Contribute your Thoughts:

0/2000 characters
Cory
3 months ago
Continuous monitoring is essential, but not the best alone.
upvoted 0 times
...
Karan
3 months ago
Wait, is multi-factor really that effective?
upvoted 0 times
...
Cary
3 months ago
Overlapping redundancy seems like overkill to me.
upvoted 0 times
...
Peggie
4 months ago
Totally agree, it limits exposure!
upvoted 0 times
...
Jeannine
4 months ago
I think compartmentalization is key for high value assets.
upvoted 0 times
...
Nichelle
4 months ago
Multi-factor authentication is important, but I’m not convinced it’s the best overall defense-in-depth strategy for environments with trust issues.
upvoted 0 times
...
Corinne
4 months ago
Continuous monitoring seems crucial for high-value assets, but I wonder if it’s enough on its own without other layers of security.
upvoted 0 times
...
Eden
4 months ago
Overlapping redundancy sounds familiar from practice questions, but I feel like it might not directly address trust concerns as effectively as other options.
upvoted 0 times
...
Idella
5 months ago
I remember studying defense-in-depth strategies, and I think compartmentalization might be the best choice here, but I'm not entirely sure.
upvoted 0 times
...
Georgeanna
5 months ago
I've got this! Compartmentalization is the way to go. By separating and isolating critical systems, you can minimize the impact of a breach and contain the damage. That's the textbook defense-in-depth approach for high-value assets.
upvoted 0 times
...
Marvel
5 months ago
Okay, let's see. Compartmentalization seems like a good strategy for isolating high-value assets. Overlapping redundancy could also provide extra layers of protection. I'll have to weigh the pros and cons of each option.
upvoted 0 times
...
Jolanda
5 months ago
Hmm, I'm a bit unsure about this one. I know defense-in-depth is important, but I'm not sure which of these options is the best implementation. I'll need to think it through carefully.
upvoted 0 times
...
Gregg
5 months ago
This looks like a classic defense-in-depth question. I think the best approach is to consider the key principles of defense-in-depth and how they apply to the scenario.
upvoted 0 times
...
Monte
5 months ago
Okay, let's see. I think the key is understanding how the iris and depth of field work together.
upvoted 0 times
...
Valentine
1 year ago
Compartmentalization? I'd rather compartmentalize my snacks during my security breaks.
upvoted 0 times
Curt
1 year ago
C) Continuous monitoring
upvoted 0 times
...
Britt
1 year ago
D) Multi-factor authentication
upvoted 0 times
...
Elenora
1 year ago
A) Compartmentalization
upvoted 0 times
...
...
Junita
1 year ago
Multi-factor authentication? More like multi-factor annoyance! But hey, it works, I guess.
upvoted 0 times
...
Margot
1 year ago
Continuous monitoring, it's the only way to stay one step ahead of those pesky hackers.
upvoted 0 times
Jaime
1 year ago
D) Multi-factor authentication
upvoted 0 times
...
Ronny
1 year ago
C) Continuous monitoring
upvoted 0 times
...
Shakira
1 year ago
B) Overlapping redundancy
upvoted 0 times
...
Tamekia
1 year ago
A) Compartmentalization
upvoted 0 times
...
...
Isaiah
1 year ago
Overlapping redundancy, baby! Can't have too many layers of security, am I right?
upvoted 0 times
Hyun
1 year ago
D) Multi-factor authentication
upvoted 0 times
...
Lyndia
1 year ago
C) Continuous monitoring
upvoted 0 times
...
Timothy
1 year ago
B) Overlapping redundancy
upvoted 0 times
...
Arthur
1 year ago
A) Compartmentalization
upvoted 0 times
...
...
Lou
1 year ago
I agree with Chandra, compartmentalization helps to limit the impact of a security breach.
upvoted 0 times
...
Dorthy
1 year ago
I personally believe that multi-factor authentication is the best option, as it adds an extra layer of security.
upvoted 0 times
...
Leoma
1 year ago
Compartmentalization all the way! Gotta keep those high-value assets locked down tight.
upvoted 0 times
Yasuko
1 year ago
C) Continuous monitoring
upvoted 0 times
...
Chi
1 year ago
D) Multi-factor authentication
upvoted 0 times
...
Antonio
1 year ago
A) Compartmentalization
upvoted 0 times
...
...
Chandra
1 year ago
I think the best defense-in-depth implementation is compartmentalization.
upvoted 0 times
...

Save Cancel