Certified Information Systems Security Professional (CISSP) Practice Exam

Image Description

Question: 1 / 1980

Which of the following is NOT included under communications security controls?

Access control mechanisms

Security protocols for data at rest

The focus here is on understanding communications security controls, which primarily address protecting data while it's being transmitted over networks. The choice regarding security protocols for data at rest pertains to securing data stored on devices rather than data in transit, and therefore falls outside the scope of communications security controls.

Access control mechanisms, encryption methods for transmission, and authentication processes are all integral to communications security. Access control mechanisms determine who can send or receive data, encryption methods safeguard sensitive information during transmission, and authentication processes verify the identities of users and systems involved in the communication. Thus, these elements work together to secure data as it travels through various networks, ensuring confidentiality, integrity, and availability during the transmission process.

Get further explanation with Examzify DeepDiveBeta

Encryption methods for transmission

Authentication processes

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy