CISSP Exam QuestionsBrowse all questions from this exam

CISSP Exam - Question 226


When network management is outsourced to third parties, which of the following is the MOST effective method of protecting critical data assets?

Show Answer
Correct Answer: B

The most effective method of protecting critical data assets when network management is outsourced to third parties is to employ strong access controls. Access controls ensure that only authorized personnel can access sensitive data, significantly reducing the risk of unauthorized access or breaches. Confidentiality agreements, activity logging, and providing links to security policies are also important measures but are not as directly effective in preventing unauthorized access as robust access controls.

Discussion

14 comments
Sign in to comment
Logan3003Option: A
Oct 11, 2022

question ask for "most effective method". disgruntled employee/malicious insider cannot stop by an NDA. answer given is correct.

jackdryan
May 13, 2023

B is correct

krasskoOption: A
Sep 23, 2022

A and B are good. But from management point of view it's A.

franbarpro
Oct 22, 2022

Am sure to be a manager of infosec you have to know some technical. So, I am thinking like a manager and going with "B"

BDSecOption: A
Sep 26, 2022

You are providing them with access, so B isn't the best option. It's A.

CuteRabbit168Option: B
Oct 10, 2022

Access controls will prevent the third party vendor from accessing data that they are not allowed to access. An NDA does not protect data. B is the best answer.

IXoneOption: B
Oct 29, 2022

I agree with B

IXoneOption: B
Oct 29, 2022

I agree with B

oudmasterOption: B
Dec 24, 2022

Option A is an NDA (non-disclosure agreement), which I dont see it applicable. The question mentioned "protecting critical data assets" which means it seeks a technical control, not administrative. I vote for B.

DJOEKOption: B
Jan 9, 2023

The MOST effective method of protecting critical data assets when network management is outsourced to third parties is to employ strong access controls. This includes implementing measures such as authentication, authorization, and access control mechanisms to ensure that only authorized users have access to the data. Confirming that confidentiality agreements are signed and logging all activities associated with sensitive systems can also help to protect the data, but strong access controls are the most important measure to ensure that only authorized users can access the data. Providing links to security policies can help to educate users about the importance of protecting data, but it is not sufficient on its own to protect the data.

BP_lobsterOption: B
Nov 16, 2022

Only option B can actively prevent access. Hence fits the "most effective method" criteria.

rajkamal0Option: B
Dec 28, 2022

B is the best answer.

HughJassoleOption: B
Jun 25, 2023

The question asks about network management being outsourced and then asking how to secure data. So the data is not outsourced, what is outsourced is who and how your network is run. "Network outsourcing is a multiyear or annuity contract/relationship involving the purchase of ongoing network or telecom management services for managing, enhancing, maintaining and supporting premises or core network infrastructure or enterprise telecommunications assets (including fixed and wireless)" https://www.gartner.com/en/information-technology/glossary/network-outsourcing-enterprise-and-public-network It seems that they are trying to confuse you with this info. The question is really about how to secure data, and B is the answer.

74gjd_37Option: B
Sep 24, 2023

B. Employ strong access controls is the MOST effective method of protecting critical data assets when network management is outsourced to third parties. Strong access controls ensure that only authorized personnel can access the critical data assets, reducing the risk of unauthorized access and data breaches. While confirming confidentiality agreements, logging all activities associated with sensitive systems, and providing links to security policies are also important measures, they may not be as effective as employing strong access controls.

homeyslOption: B
Oct 19, 2023

B is correct. Other options won't stop a determined individual from accessing sensitive data.

CCNPWILLOption: B
May 30, 2024

which of the following is the MOST effective method of protecting critical data assets? B. Employ strong access controls Its the most effective. its taking action to protect data.