Chapter 5: Security Controls Flashcards

Understand Security Controls

1
Q

{Blank} are procedures and mechanisms that an organization puts in place to address security risks in some manner.

A

Security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Applying multiple overlapping controls to achieve the same objective.

A

Defense in Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

{Blank} are designed to stop a security issue from occuring in the first place,

A

Preventive controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

{Blank} identify potential security breaches that require further investigation.

A

Detective controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

{Blank} remediate security issues that have already occured.

A

Recovery controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Technical controls use technology to achieve security objectives. What other terms describes the same type of control.

A

Logical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

{Blank} include the processes that you put in place to manage technology in a secure manner. These include many of the tasks that security professionals carry out each day, such as user access reviews, log monitoring, background checks, and security awarness training.

A

Administrative controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

{Blank} are those that impact the physical world. Locks are used to keep people out of buildings, cameras to detect unauthorized intrustions, and security guards to monitor activity in out facilities .

A

Physical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can security controls be classified by?

A
  • Purpose
  • Mechanism of action
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tonya is concerned about the risk that an attacker will attempt to gain access to her organizations’s database server. She is searching for a control that would blockthe attacker’s attempt to gain access. Which type of security control is she seeking to implement?

A. Technical
B. Detective
C. Recovery
D. Preventive

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tonya evaluated all of the options available to her for protecting her database and decided to implement strong encrytion to protect the contents of the data in her database. Which mechanism of action is she using?

A. Technical
B. Administrative
C. Preventive
D. Physical

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three purpose categories for security controls?

A
  • Preventive controls
  • Detective controls
  • Recovery controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three mechanism of action categories for security controls?

A
  • Technical controls
  • Administrative controls
  • Physical controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly