security controls Flashcards

(25 cards)

1
Q

What is a security control in cybersecurity?

A

A security control is a safeguard or countermeasure used to protect information systems from threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Security controls can be physical, technical, or administrative.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: __________ controls are designed to protect the physical aspects of an organization.

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of control is encryption considered?

A

Technical control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is an example of an administrative control? A) Firewall B) Security policy C) Surveillance cameras

A

B) Security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary purpose of access controls?

A

To restrict access to information and resources to authorized users only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: Preventive controls are intended to deter or prevent security incidents.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do detective controls aim to achieve?

A

They aim to identify and alert on security incidents as they occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: __________ controls are used to mitigate the impact of a security incident after it has occurred.

A

Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name one example of a technical control.

A

Firewalls, antivirus software, intrusion detection systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which control type includes policies, procedures, and training?

A

Administrative controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: Security controls are only necessary for large organizations.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of a firewall in cybersecurity?

A

A firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are security patches?

A

Updates designed to fix vulnerabilities in software applications or operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multiple Choice: Which of the following is NOT a type of security control? A) Preventive B) Detective C) Reactive D) Corrective

A

C) Reactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of incident response plans?

A

To prepare for, respond to, and recover from security incidents effectively.

17
Q

Fill in the blank: The __________ principle states that users should only have access to the information necessary for their job functions.

A

Least privilege

18
Q

What is two-factor authentication?

A

A security process that requires two different forms of identification to access a system.

19
Q

True or False: Security awareness training is an example of a technical control.

20
Q

What does the term ‘vulnerability assessment’ refer to?

A

The process of identifying, quantifying, and prioritizing vulnerabilities in a system.

21
Q

Name a key benefit of implementing security controls.

A

They help protect sensitive data and reduce the risk of security incidents.

22
Q

What is the function of an intrusion detection system (IDS)?

A

To monitor network traffic for suspicious activity and alert administrators.

23
Q

True or False: All security controls are equally effective against every type of threat.

24
Q

What is the difference between a vulnerability and a threat?

A

A vulnerability is a weakness in a system, while a threat is a potential cause of an unwanted incident.

25
What is risk management in the context of security controls?
The process of identifying, assessing, and prioritizing risks, followed by coordinated efforts to minimize, monitor, and control the probability of unfortunate events.