Which of the following BEST describes the purpose of security controls?
A. To eliminate all security risks
B. To minimize impact and limit damage from security events
C. To guarantee 100% system uptime
D. To remove the need for security training
Answer: B — Security controls minimize impact and limit damage.
Explanation: Security controls cannot remove all risks or guarantee uptime. Their main function is to reduce risk exposure and limit the impact if a security event occurs.
Memory Trick: “Control the damage, don’t chase perfection.”
(Your notes: “Prevent security events, minimize the impact, and limit the damage.”)
Which security control category includes firewalls and operating system security?
A. Managerial
B. Technical
C. Operational
D. Physical
Answer: B — Technical controls.
(Your notes: “Technical controls – OS controls, firewalls, antivirus.”)
Explanation: Technical controls are software or hardware mechanisms used to enforce security (like firewalls, antivirus, encryption).
Memory Trick: “Tech = Tools & Tech stuff.”
Security awareness programs fall under which type of control?
A. Technical
B. Managerial
C. Operational
D. Compensating
Answer: C — Operational controls.
(Your notes: “Operational controls – implemented by people… awareness programs.”)
Explanation: Operational controls are people-based processes that implement security policies, such as training, procedures, or incident handling.
Memory Trick: “Operations = what people actually do.”
Which of the following is a physical control?
A. Review login reports
B. Badge readers
C. System logs
D. Security policies
Answer: B — Badge readers.
(Your notes: “Physical controls – fences, locks, badge readers.”)
Explanation: Physical controls protect the physical environment (doors, locks, fences, badges). They limit physical access rather than system access.
Memory Trick: “Physical = you can touch it.”
A control designed to block access before an event occurs is known as:
A. Detective
B. Corrective
C. Preventive
D. Directive
Answer: C — Preventive control.
(Your notes: “Preventive — Block access to a resource.”)
Explanation: Preventive controls stop incidents before they happen, like firewalls, locks, and access restrictions.
Memory Trick: “Preventive = Stop it before it starts.”
Which control type is meant to discourage an intrusion attempt but not prevent access?
A. Preventive
B. Deterrent
C. Compensating
D. Corrective
Answer: B — Deterrent.
(Your notes: “Deterrent — Discourage an intrusion attempt.”)
Explanation: Deterrent controls discourage or warn attackers but do not physically stop access (like warning signs or splash screens).
Memory Trick: “Deterrent = Don’t dare try it.”
System logs, motion detectors, and reviewing login reports are examples of which control type?
A. Detective
B. Preventive
C. Physical
D. Directive
Answer: A — Detective controls.
(Your notes: “Detective — Identify and log an intrusion attempt.”)
Explanation: Detective controls identify and record incidents, helping organizations spot breaches after they occur.
Memory Trick: “Detective = Detect and document.”
Front:
Which control type applies after an event to minimize downtime and restore operations?
A. Directive
B. Corrective
C. Deterrent
D. Operational
Answer: B — Corrective.
(Your notes: “Corrective — Apply a control after an event… restoring from backups.”)
Explanation: Corrective controls fix problems after they happen, like restoring from backups.
Memory Trick: “Corrective = Correct the problem after it occurs.”
A company uses a generator after a power outage because existing controls were not enough. This is an example of:
A. Compensating control
B. Preventive control
C. Corrective control
D. Directive control
Answer: A — Compensating control.
(Your notes: “Compensating… used when existing controls aren’t sufficient… generator after power outage.”)
Explanation: Compensating controls fill gaps when primary controls are insufficient. A generator is a temporary solution to maintain operations.
Memory Trick: “Compensating = covering for what’s missing.”
Posting a sign that says “Authorized Personnel Only” is an example of:
A. Compensating control
B. Directive control
C. Corrective control
D. Managerial control
Answer: B — Directive control.
(Your notes: “Directive — Post a sign for ‘Authorized Personnel Only.’”)
Explanation: Directive controls guide behavior through rules, signage, or policies.
Memory Trick: “Directive = Direct people on what to do.”
What does the CIA Triad stand for?
A. Control, Integrity, Authentication
B. Confidentiality, Integrity, Availability
C. Confidentiality, Identification, Access
D. Control, Identity, Availability
Answer: B — Confidentiality, Integrity, Availability.
Explanation: CIA Triad = core principles of information security.
Memory Trick: “CIA = Keep secrets, accurate data, available systems.”
Which principle ensures information is only accessible to authorized users?
A. Integrity
B. Availability
C. Confidentiality
D. Authentication
Answer: C — Confidentiality.
(Your notes: “Prevent disclosure to unauthorized individuals.”)
Explanation: Confidentiality prevents unauthorized disclosure.
Memory Trick: “Confidential = keep secrets safe.”
Which method BEST supports confidentiality?
A. Hashing
B. Encryption
C. Backup recovery
D. Redundancy
Answer: B — Encryption.
(Your notes: “Encode messages so only certain people can read it.”)
Explanation: Encryption scrambles data so only authorized users can read it.
Memory Trick: “Encrypt = secret code.”
B. Encryption ✅
Explanation:
Confidentiality means keeping information private and only accessible to authorized users.
Encryption converts data into a coded format that only someone with the correct key can read, directly supporting confidentiality.
Why the other options are incorrect:
A. Hashing ❌
Hashing ensures integrity (verifying data hasn’t changed), not confidentiality.
Hashes are one-way; they don’t hide the original data for privacy.
C. Backup recovery ❌
Backup recovery supports availability, ensuring data can be restored after loss. It doesn’t protect secrecy.
D. Redundancy ❌
Redundancy (duplicate systems or storage) also supports availability, not confidentiality.
Mnemonic:
“Encryption = Locking data away for authorized eyes only.”
Which concept ensures data is not modified without detection?
A. Integrity
B. Confidentiality
C. Availability
D. Non-repudiation
Back:
Answer: A — Integrity.
(Your notes: “Messages can’t be modified without detection.”)
Explanation: Integrity guarantees data accuracy and signals tampering.
Memory Trick: “Integrity = stays intact.”
Digital signatures and hashing mainly support which part of the CIA Triad?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication
Answer: C — Integrity.
(Your notes: “Hashing… Digital signatures verify integrity of data.”)
Explanation: Digital signatures & hashing verify data has not changed.
Memory Trick: “Sign + hash = prove unchanged.”
Ensuring systems are always accessible to authorized users is part of:
A. Integrity
B. Confidentiality
C. Availability
D. Validity
Answer: C — Availability.
(Your notes: “Information is accessible… Always at your fingertips.”)
Explanation: Availability ensures systems are usable when needed.
Memory Trick: “Available = always at your fingertips.”
Which method supports availability?
A. Certificates
B. Redundancy
C. Hashing
D. Two-factor authentication
Answer: B — Redundancy.
(Your notes: “Redundancy — Build services that will always be available.”)
Explanation: Redundancy keeps services running if one system fails.
Memory Trick: “Redundant = backup ready.”
Which statement BEST describes why security controls are needed?
Which statement BEST describes why security controls are needed?
A. Because all security systems are perfect
B. To prevent security events, minimize impact, and limit damage
C. To eliminate physical assets
D. To remove the need for security policies
Answer: B — Security controls minimize impact and limit damage.
Explanation: Non-repudiation prevents denial of an action (e.g., signing a digital document).
Memory Trick: “Non-repudiation = can’t deny you did it.”
Assets protected by security controls include:
A. Only financial data
B. Only physical property
C. Only computer systems
D. Data, physical property, and computer systems
Answer: D — All three are assets.
xplanation: Security controls protect all types of assets — not just digital systems. This includes:
Data (confidentiality, backups, access control)
Physical property (locks, guards, cameras)
Computer systems (firewalls, encryption, monitoring)
Security is holistic: it covers everything the organization values.
Memory Trick:
Think “D = the whole Deal” — Data, Devices, and Doors.
Which is a characteristic of managing security controls?
A. There is only one correct control for each environment
B. All organizations use identical controls
C. Some controls exist in multiple categories
D. Controls never overlap
Answer: C — Some controls apply to multiple categories.
xplanation:
Security controls can belong to more than one category or control type depending on how they are used.
Example:
A badge reader is physical and preventive.
Security training is operational and directive.
This flexibility is normal because environments differ, risks change, and controls often overlap to strengthen defense-in-depth.
Memory Trick:
Think “C = Controls can combine.”
Controls don’t fit in a single box — they overlap and support each other.
Which category includes “operating system controls” and “firewalls”?
A. Technical
B. Managerial
C. Operational
D. Physical
Answer: A — Technical controls.
Explanation:
Technical controls are technology-based protections implemented through hardware, software, or system configurations.
Examples include:
Firewalls
Operating system security settings
Access control lists (ACLs)
Antivirus software
They work by controlling digital access and system behavior, not by relying on people or physical protections.
Memory Trick:
“Tech = Tools.”
If it runs on software or hardware → it’s Technical.
Security policies and standard operating procedures are what type of control?
A. Managerial
B. Technical
C. Operational
D. Compensating
Answer: A — Managerial controls.
Explanation:
Managerial controls are high-level, administrative, and governance-based controls created by leadership to guide the organization’s security posture.
Security policies and SOPs:
Define rules
Provide oversight
Direct staff behavior
Establish expectations for security processes
They don’t involve technology or physical tools—they involve management decisions and documentation.
Memory Trick:
“Managers make the rules.”
If it’s a policy, procedure, or governance document → it’s Managerial.
Which control category is implemented by people instead of systems?
A. Technical
B. Managerial
C. Operational
D. Physical
Answer: C — Operational controls.
Explanation:
Operational controls are implemented by people, not automated systems.
These include processes, procedures, awareness training, incident response, and general day-to-day security activities performed by staff.
Why the others are incorrect:
A. Technical – Implemented by technology or systems (e.g., firewalls, encryption, IDS).
B. Managerial – High-level oversight controls like risk assessments, policies, and planning.
D. Physical – Controls you can touch, like locks, fences, cameras, guards.
Limiting physical access through fences, locks, or guard shacks is what category?
A. Operational
B. Physical
C. Technical
D. Managerial
Answer: B — Physical controls.
Explanation (Why this answer is correct):
Physical controls are security measures you can touch—they prevent or deter physical access to buildings, rooms, or equipment.
Fences, locks, guard shacks, security guards, doors, lighting, and cameras all fall under physical controls.
Why the other types are incorrect:
Technical: Implemented by systems (e.g., firewalls, encryption).
Managerial: High-level administrative controls like policies, risk assessments.
Operational: Human-executed processes like training, incident response, change management.