Cram Guide SON 1.1 &1.2 Flashcards

1
Q

What are technical security controls?

A

Controls implemented through hardware or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an example of a technical control?

A

Firewalls, encryption, IDS, authentication, and access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a key advantage of technical controls?

A

They provide automated protection and scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a drawback of technical controls?

A

They can fail or become outdated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are managerial security controls?

A

Controls that focus on governance, strategy, and security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a key advantage of managerial controls?

A

They align security with organizational goals and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a drawback of managerial controls?

A

Their effectiveness depends on managerial commitment and upkeep.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are operational security controls?

A

Controls tied to daily tasks and procedures followed by users or admins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of an operational control?

A

Backups, user training, incident response, and change management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a key advantage of operational controls?

A

They address user actions and routine security practices directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a drawback of operational controls?

A

They depend on consistent human action and are prone to error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are physical security controls?

A

Controls that protect the physical environment of information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an example of a physical control?

A

Guards, fences, locks, CCTV, biometrics, server rooms, fire suppression.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a key advantage of physical controls?

A

They defend against theft, damage, and natural disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a drawback of physical controls?

A

No protection against cyber threats & maintenance cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are corrective security controls?

A

Controls that respond to and fix security incidents after they occur.

17
Q

What is an example of a corrective control?

A

Antivirus quarantine, incident response, backups, or patching.

18
Q

What are compensating security controls?

A

Alternative controls used when primary controls aren’t feasible.

19
Q

What is an example of a compensating control?

A

Strong password policy and behavior monitoring instead of MFA.

20
Q

What is non-repudiation in security?

A

It ensures no party can deny sending or receiving information.

21
Q

What is the control plane in Zero Trust?

A

It verifies identity and access dynamically using policy-driven decisions.

22
Q

What is the data plane in Zero Trust?

A

It enforces access decisions and defines trust boundaries between systems.

23
Q

What is the role of the Policy Engine in Zero Trust?

A

It evaluates access requests based on defined policies.

24
Q

What is the Policy Enforcement Point in Zero Trust?

A

It executes access decisions made by the policy engine.

25
What is a honeypot?
A decoy system designed to lure and trap attackers.
26
What is a honeynet?
A network made up of multiple honeypots.
27
What is a honeyfile?
A fake file placed to detect unauthorized access.
28
What is a honeytoken?
A piece of trap data that alerts when accessed.