security controls Flashcards
(25 cards)
What is a security control in cybersecurity?
A security control is a safeguard or countermeasure used to protect information systems from threats.
True or False: Security controls can be physical, technical, or administrative.
True
Fill in the blank: __________ controls are designed to protect the physical aspects of an organization.
Physical
What type of control is encryption considered?
Technical control
Which of the following is an example of an administrative control? A) Firewall B) Security policy C) Surveillance cameras
B) Security policy
What is the primary purpose of access controls?
To restrict access to information and resources to authorized users only.
True or False: Preventive controls are intended to deter or prevent security incidents.
True
What do detective controls aim to achieve?
They aim to identify and alert on security incidents as they occur.
Fill in the blank: __________ controls are used to mitigate the impact of a security incident after it has occurred.
Corrective
Name one example of a technical control.
Firewalls, antivirus software, intrusion detection systems.
Which control type includes policies, procedures, and training?
Administrative controls
True or False: Security controls are only necessary for large organizations.
False
What is the role of a firewall in cybersecurity?
A firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules.
What are security patches?
Updates designed to fix vulnerabilities in software applications or operating systems.
Multiple Choice: Which of the following is NOT a type of security control? A) Preventive B) Detective C) Reactive D) Corrective
C) Reactive
What is the purpose of incident response plans?
To prepare for, respond to, and recover from security incidents effectively.
Fill in the blank: The __________ principle states that users should only have access to the information necessary for their job functions.
Least privilege
What is two-factor authentication?
A security process that requires two different forms of identification to access a system.
True or False: Security awareness training is an example of a technical control.
False
What does the term ‘vulnerability assessment’ refer to?
The process of identifying, quantifying, and prioritizing vulnerabilities in a system.
Name a key benefit of implementing security controls.
They help protect sensitive data and reduce the risk of security incidents.
What is the function of an intrusion detection system (IDS)?
To monitor network traffic for suspicious activity and alert administrators.
True or False: All security controls are equally effective against every type of threat.
False
What is the difference between a vulnerability and a threat?
A vulnerability is a weakness in a system, while a threat is a potential cause of an unwanted incident.