CISM Exam QuestionsBrowse all questions from this exam

CISM Exam - Question 587


Which of the following is the MOST appropriate resource to determine whether or not a particular solution should utilize encryption based on its location and data classification?

Show Answer
Correct Answer: CD

Policies are the most appropriate resource to determine whether or not a particular solution should utilize encryption based on its location and data classification. Policies are high-level documents that define the organization's overall security goals and objectives. They establish the overarching rules and principles that guide how data should be handled, including when encryption should be used. These policies typically take into account factors such as the data's location and classification level to outline specific requirements for data encryption.

Discussion

13 comments
Sign in to comment
mohit05Option: D
Jan 18, 2023

D. Policies would be the most appropriate resource to determine whether or not a particular solution should utilize encryption based on its location and data classification. Policies are a set of rules and regulations that dictate how data should be handled and protected. They typically outline specific requirements for data encryption, and may take into account factors such as the location of the data and its classification level.

MyKasalaOption: C
Jan 23, 2023

I guess C

[Removed]
Mar 21, 2023

Standards can include guidelines for securing information systems, defining access controls, encrypting data, or protecting sensitive information

Gr3yGh0sTOption: D
Apr 30, 2023

The MOST appropriate resource to determine whether or not a particular solution should utilize encryption based on its location and data classification is policies. Policies are high-level documents that define the organization's overall security goals and objectives. They typically include requirements for encryption, as well as other security controls. When determining whether or not to encrypt a particular solution, organizations should first consult their policies. The policy will specify the types of data that must be encrypted, as well as the encryption requirements for those data types.

welloOption: C
Jun 13, 2023

tandards provide specific requirements and specifications that organizations are expected to adhere to, and they may include guidance on encryption based on data classification and location.

wickhaarryOption: C
Jul 25, 2023

C https://frsecure.com/blog/differentiating-between-policies-standards-procedures-and-guidelines/

koala_layOption: D
Sep 21, 2023

The most appropriate resource to determine whether or not a particular solution should utilize encryption based on its location and data classification would be policies. Policies are high-level documents that define an organization's overarching principles, goals, and guidelines. They establish the strategic direction and provide a framework for decision-making. In the context of information security, policies often outline the organization's stance on various security measures, including encryption.

babadook13Option: C
Nov 16, 2023

it's C

SaisharanOption: D
Jun 8, 2023

Option D. Policies provide the high-level guidance and direction for information security, including determining when encryption should be used based on factors such as location and data classification.

richck102Option: C
Jun 29, 2023

C. Standards

oluchecpointOption: D
Sep 8, 2023

Policies provide high-level guidance and direction for an organization's approach to security and data protection. They set the overarching rules and principles that govern how data should be handled, including when encryption should be used. Policies often take into account the organization's risk tolerance, legal requirements, and industry best practices. Guidelines, procedures, and standards are typically more detailed documents that stem from policies

Bl1024Option: C
Sep 9, 2023

Policies are not sesitive to specific solutions, standards are used to determine the rules regarding specific systems in accordance with the more general dictation of policies

maisarajarrahOption: C
Jan 2, 2024

it's C

03allenOption: C
Jun 18, 2024

I think it's C. Policies will give very high-level direction, but for a single system, it will follow the security standard.