Chapter 1: Security Controls and Concepts Flashcards
(34 cards)
Question: Which type of security control is implemented through technology, often hardware or software-based?
A) Managerial Security Control
B) Operational Security Control
C) Technical Security Control
D) Physical Security Control
Answer: C) Technical Security Control
Question: Security policies and procedures, risk assessments, and security training programs are examples of which type of security control?
A) Technical Security Control
B) Managerial Security Control
C) Operational Security Control
D) Physical Security Control
Answer: B) Managerial Security Control
Question: True or False: Operational security controls directly address user behavior and day-to-day operations.
True
Question: Which type of security control is designed to protect the physical environment of information assets?
A) Technical Security Control
B) Managerial Security Control
C) Operational Security Control
D) Physical Security Control
Answer: D) Physical Security Control
Question: Which of the following security controls aims to prevent an incident or breach from occurring in the first place?
A) Deterrent Security Control
B) Detective Security Control
C) Preventive Security Control
D) Corrective Security Control
Answer: C) Preventive Security Control
Question: Warning banners and visible surveillance cameras are examples of which type of security control?
A) Preventive Security Control
B) Deterrent Security Control
C) Detective Security Control
D) Corrective Security Control
Answer: B) Deterrent Security Control
Question: What is the primary function of detective security controls?
Answer: To identify and alert on anomalies or security incidents.
Question: Which type of security control aims to limit the extent of damage and correct the situation once a security incident has been detected?
A) Preventive Security Control
B) Deterrent Security Control
C) Detective Security Control
D) Corrective Security Control
Answer: D) Corrective Security Control
Question: When primary security controls are ineffective or unfeasible, which type of control provides alternative measures to achieve similar security objectives?
A) Directive Security Control
B) Compensating Security Control
C) Corrective Security Control
D) Preventive Security Control
Answer: B) Compensating Security Control
Question: What is the primary function of directive security controls?
Answer: To provide a roadmap or guidance for security best practices within an organisation
Question: What are the three core principles of the CIA triad in information security?
A) Control, Identification, Assurance
B) Confidentiality, Integrity, Availability
C) Compliance, Implementation, Audit
D) Centralisation, Isolation, Access
Answer: B) Confidentiality, Integrity, Availability
Question: True or False: Non-repudiation guarantees that a sender of information can later deny having sent it.
Answer: False
Question: What does “Authentication” refer to in the AAA framework?
Answer: Verifying the identity of users, systems, or entities.
Question: In the AAA framework, what defines permissions and determines what authenticated users or systems are allowed to do?
A) Authentication
B) Authorisation
C) Accounting
D) Auditing
Answer: B) Authorisation
Question: Which component of the AAA framework tracks user activities to ensure they are operating within their designated permissions?
A) Authentication
B) Authorisation
C) Accounting
D) Access Control
Answer: C) Accounting
Question: What is the purpose of a Gap Analysis in security?
Answer: To identify differences between current security practices and desired outcomes or standards.
Question: Which Zero Trust concept dynamically adjusts user/system identity verification based on context?
A) Threat Scope Reduction
B) Policy-driven Access Control
C) Adaptive Identity
D) Implicit Trust Zones
Answer: C) Adaptive Identity
Question: What is a “Honeypot” in deception and disruption technology?
Answer: A decoy system or data set up to lure attackers.
Question: True or False: A Honeynet is a single decoy system designed to attract attackers.
Answer: False (A Honeynet is a network of honeypots.)
Question: What is a “Honeytoken”?
Answer: A piece of data used to alert when accessed, which has no real-world use other than being a trap.
Question: Which aspect of business processes in change management ensures that only vetted and necessary changes get implemented, reducing the risk of introducing vulnerabilities?
A) Ownership
B) Stakeholders
C) Approval Process
D) Backout Plan
Answer: C) Approval Process
Question: True or False: In change management, a backout plan is important only for major system overhauls and not for minor updates.
Answer: False (A backout plan is essential to revert changes if unforeseen vulnerabilities are introduced, regardless of change size.)
Question: Which technical implication of change management might require updating lists that determine which activities or entities are permitted or prohibited, directly affecting security postures?
A) Downtime
B) Legacy Applications
C) Allow lists/Deny lists
D) Service Restart
Answer: C) Allow lists/Deny lists
Question: What is the security concern related to “Legacy Applications” during change management?
Answer: Older software might not be compatible with new changes and can have unresolved vulnerabilities.