Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

COMPTIA SECURITY + 701

Rating
-
Sold
-
Pages
63
Grade
A+
Uploaded on
23-07-2025
Written in
2024/2025

COMPTIA SECURITY + 701 COMPTIA SECURITY + 701 COMPTIA SECURITY + 701

Institution
COMPTIA SECURITY + 701
Course
COMPTIA SECURITY + 701

Content preview

COMPTIA SECURITY 701
Technical Controls: ANS: These use technology to protect assets and control access to systems and data.
Examples include firewalls, encryption, antivirus software, and intrusion detection systems.



Managerial Controls: ANS: These involve strategies, policies, and procedures that manage the overall
security of an organization. Examples include risk assessments, security training, and auditing practices.



Operational Controls: ANS: These are implemented to improve the day-to-day operations and security
of the organization. They include change management, data backup procedures, and incident response
processes.



Physical Controls: ANS: These restrict physical access to organizational resources like buildings, rooms,
and hardware. Examples include locks, biometric scanners, security guards, and fence barriers.



Preventive Controls: ANS: Intended to prevent security incidents before they occur. Examples include
locks, authentication mechanisms, and network access controls.



Deterrent Controls: ANS: Aim to discourage security violations. Examples are signage, policies like
'termination for violations', and visible surveillance cameras.



Detective Controls: Designed to identify and detect security incidents as they occur. Examples include
motion detectors, intrusion detection systems, and log monitoring. ANS: Designed to identify and
detect security incidents as they occur. Examples include motion detectors, intrusion detection systems,
and log monitoring.



Corrective Controls: ANS: Focus on repairing or restoring systems after a security incident has occurred.
Examples are patches, system restores, and intrusion repair protocols.

,Compensating Controls: ANS: Provide alternative security measures when existing controls are deemed
insufficient. They compensate for weaknesses and include multiple-factor authentication where single-
factor fails.



Directive Controls: ANS: These controls are intended to direct, confine, or control the actions of
subjects to force or encourage compliance with security policies. Examples include security awareness
training and posted notifications.



Confidentiality: ANS: Ensuring that data is accessible only to those authorized to have access.



Integrity: ANS: Safeguarding the accuracy and completeness of information and processing methods.



Availability: ANS: Ensuring that authorized users have access to information and associated assets when
required.



Non-repudiation ANS: Ensures that a party in a transaction cannot deny the authenticity of their
signature on a document or a message that they originated, thereby ensuring accountability.



Authenticating People: ANS: Verifying the identity of users, typically through passwords, biometrics, or
tokens.



Authenticating Systems ANS: : Confirming the identity of systems or machines, often using certificates
or pre-shared keys.



Authorization Models ANS: : Methods for granting or denying user rights and permissions to access
resources.



Accounting: ANS: Tracking user activities and recording security events to provide an audit trail.

,Gap Analysis ANS: A method of assessing the differences between the current security measures and
the desired state, identifying areas of improvement to achieve security objectives.



Zero Trust ANS: Is a security model that operates on the principle of "never trust, always verify,"
requiring strict identity verification for every user and device trying to access resources within a
network, regardless of their location. This approach employs least privilege access and
microsegmentation to minimize the attack surface and enhance security by continuously validating the
security posture of all entities interacting with the system.



Threat Scope Reduction: ANS: is the process of minimizing potential attack vectors in an organization by
reducing the number of exploitable systems, services, or privileges. This helps lower the risk of
successful cyberattacks through techniques like patching, network segmentation, and enforcing least
privilege.



Adaptive Identity: ANS: refers to a dynamic security approach that adjusts user authentication and
access control based on real-time risk factors, such as behavior patterns, location, or device. It
strengthens security by continuously verifying identity during access.



Policy-driven Access Control: ANS: Access decisions are made dynamically based on a comprehensive
evaluation of trust states.



Policy Administrator/Engine ANS: : Central points for managing and enforcing security policies.



Implicit Trust Zones ANS: refer to areas within a network where systems, devices, or users are
automatically trusted without additional verification. These zones lack strict access controls, assuming
entities within the zone are safe, which can increase security risks if not properly managed.



Subject/System: ANS: the Subject refers to the entity (such as a user or process) that requests access to
resources, while the System (or Object) refers to the resource being accessed, such as files, databases,
or applications. Access control mechanisms manage the interaction between the subject and system to
ensure security.

, Policy Enforcement Point: ANS: is a functional component that enforces access control policies in secure
environments. It ensures that the security policies and rules are applied when a subject tries to access
an object (such as files or systems).



Bollards: ANS: Short vertical posts designed to prevent vehicle intrusion into secure areas.



Access Control Vestibule: ANS: A secured entryway that typically includes two sets of doors and an
authentication system to control individual access.



Fencing: ANS: Barriers used to secure an area by preventing unauthorized physical entries.



Video Surveillance: ANS: Cameras and monitoring equipment used to oversee premises and record
activities for security review and enforcement.



Security Guard: ANS: Personnel tasked with physical security duties including monitoring surveillance,
patrolling property, and responding to incidents.



Access Badge: ANS: Identification cards used to grant access to restricted areas through electronic
reader systems.



Lighting: ANS: Essential for enhancing visibility and deterring unauthorized access, especially in
vulnerable and dark areas around a property.



Infrared: ANS: Detect unauthorized movement based on body heat.



Pressure ANS: Trigger alarms or alerts when pressure changes are detected, typically used on floors or
mats.



Microwave: ANS: Uses microwave pulses to detect movement through changes in frequency.

Written for

Institution
COMPTIA SECURITY + 701
Course
COMPTIA SECURITY + 701

Document information

Uploaded on
July 23, 2025
Number of pages
63
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$16.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
lectjoseph Harvard University
Follow You need to be logged in order to follow users or courses
Sold
77
Member since
2 year
Number of followers
23
Documents
5503
Last sold
4 days ago

learning is hard ,but with me it will be easier. Timely ,detailed and organized study guides and notes that will save you a lot of study time. Reviews are highly appreciated. Wishing you the best

3.5

10 reviews

5
4
4
1
3
2
2
2
1
1

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions