Section 3: Security Controls Categories and Types Flashcards
(15 cards)
Type: Question & Answer
Question: What type of security controls are mechanisms implemented into hardware, software, or firmware to automate the process of preventing, detecting, and responding to security threats?
Answer: Technical Controls (also known as logical security controls)
Type: Multiple Choice Question (Select ONE answer)
Question: Firewalls, Intrusion Detection Systems (IDS), and encryption software are examples of which category of security controls?
A) Managerial Controls
B) Operational Controls
C) Physical Controls
D) Technical Controls
Answer: D) Technical Controls
Type: True/False
Question: Security policies and risk management plans are considered Operational Controls because they deal with day-to-day procedures.
Answer: False (They are Managerial Controls.)
Type: Multiple Choice Question (Select ALL that apply)
Question: Which of the following are examples of Managerial Controls?
A) Security Policies and Procedures
B) Firewalls
C) Incident Response and Recovery Plans
D) Antivirus Software
Answer: A, C
Type: Question & Answer
Question: What type of security controls focus on day-to-day procedures implemented by an organisation to maintain the security of its information and assets?
Answer: Operational Controls
Type: Question & Answer
Question: Lighting, signs, fences, and security guards are examples of which type of security control?
Answer: Physical Controls
Type: True/False
Question: Physical controls are primarily designed to prevent unauthorised access, damage, or interference to physical hardware and facilities.
Answer: True
Type: Question & Answer
Question: What type of security control is implemented to stop a security incident from happening?
Answer: Preventative Controls
Type: Multiple Choice Question (Select ONE answer)
Question: Which of the following is an example of a Detective Control?
A) An Intrusion Prevention System (IPS) blocking malicious traffic
B) Encryption of sensitive data at rest
C) Video surveillance monitoring a data centre
D) A policy requiring strong passwords
Answer: C) Video surveillance monitoring a data centre
Type: True/False
Question: Restoring backups after a ransomware infection is an example of a Corrective Control.
Answer: True
Type: Multiple Choice Question (Select ALL that apply)
Question: Which of the following are examples of Deterrent Controls?
A) Guard dogs
B) Security cameras
C) Barbed wire fences
D) Incident response procedures
Answer: A, B, C
Type: Question & Answer
Question: What type of security control is implemented to provide direction on how systems work or are to be used, such as policies and procedures?
Answer: Directive Controls
Type: True/False
Question: A Compensating Control is always the preferred primary control for addressing a security risk.
Answer: False (Compensating controls provide an alternative when primary controls are insufficient.)
Type: Question & Answer
Question: What information assurance concept involves placing multiple layers of security controls within an IT system to protect information?
Answer: Layered Security (also known as Defence in Depth)
Type: True/False
Question: Defence in Depth relies on a single, strong security control to protect an entire system.
Answer: False (It relies on multiple layers of controls.)