1. Which of the following is an example of the technical security control?
Login identifier
Session timeout, System log
Audit trails, Input validation
Firewalls, Encryption
All of the above
Answer: All of the above
2. ________ would be the best example of an operational security control category.
Continuity planning
Application security
Secure by design
Cryptography
Answer: Continuity planning
3. Which category of security controls is primarily focused on the implementation of
technologies and systems to safeguard against unauthorized access and threats to assets?
Managerial security controls
Technical security controls
Operational security controls
Physical security controls
Answer: Technical security controls
4. Which of the following is NOT an example of a physical security control?
Remote control electronic locks
Security cameras
Firewalls
Biometric access controls
Answer: Firewalls
5. Which of the following is an example of a deterrent control?
Segregation of responsibilities
A warning banner
An intrusion detection system (IDS)
Periodic data restoration
Answer: A warning banner
6. Which of the following actions is considered a corrective security control aimed at
restoring systems after a security breach?