New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CCSP Exam - Topic 4 Question 15 Discussion

Actual exam question for ISC2's CCSP exam
Question #: 15
Topic #: 4
[All CCSP Questions]

Database activity monitoring (DAM) can be:

Show Suggested Answer Hide Answer
Suggested Answer: A

We don't use DAM in place of encryption or masking; DAM augments these options without replacing them. We don't usually think of the database interaction as client-server, so A is the best answer.


Contribute your Thoughts:

0/2000 characters
An
4 months ago
Wait, can DAM really do all that? Sounds too good to be true.
upvoted 0 times
...
Anisha
4 months ago
Totally agree, it's not a replacement for data masking either.
upvoted 0 times
...
Linwood
4 months ago
Used in place of encryption? No way!
upvoted 0 times
...
Xochitl
4 months ago
I think it's more about server-based vs client-based.
upvoted 0 times
...
Jolene
5 months ago
DAM can definitely be host-based or network-based.
upvoted 0 times
...
Chantay
5 months ago
I definitely recall that DAM is often discussed in the context of network security, so I’m leaning towards option A.
upvoted 0 times
...
Sylvia
5 months ago
I remember practicing a question about database security, and I think it mentioned something about server-based solutions.
upvoted 0 times
...
Kathrine
5 months ago
I think DAM can be host-based or network-based, but I'm not entirely sure if that's the only classification.
upvoted 0 times
...
Marcos
5 months ago
I feel like DAM is more about monitoring rather than replacing encryption or data masking, but I could be wrong.
upvoted 0 times
...
Kathrine
5 months ago
The GPS sensor is the obvious choice here. That's the sensor designed to track the location of mobile assets.
upvoted 0 times
...
Lenna
5 months ago
I'm a bit confused on this one. I know the database needs to be mounted, but I'm not sure about all the specific actions that happen. I'll have to review my notes.
upvoted 0 times
...
Goldie
5 months ago
This seems like a straightforward question. The key is remembering the specific command to list the mail queue, which is mailq. I'm confident B is the right answer.
upvoted 0 times
...
Thora
5 months ago
This question seems pretty straightforward. I think the key is to identify the one thing that is not important to do when expanding the privacy program to a new jurisdiction.
upvoted 0 times
...
Ressie
5 months ago
Okay, let's see. The pattern is used to maintain network connectivity when virtual servers are moved between hosts. So it's probably related to the virtual network configuration, not the physical network. I'm leaning towards B or D.
upvoted 0 times
...
Lea
5 months ago
Hmm, I think the key here is to describe the requirements at a high level of abstraction, so they can be applied more broadly. That's probably the best approach.
upvoted 0 times
...

Save Cancel