Which 3 are Functional Control types: Deterrent, Preventive, Compensating, Detective?,”Deterrent, Preventive, and Detective. (Compensating is an alternate method).”
Answer: A. Deterrent, B. Preventive, D. Detective. Functional controls include deterrent, preventive, detective, and corrective. Compensating controls are not considered functional types—they are alternate methods used to reduce risk when standard controls are not feasible.
What type of control is Security Awareness Training?,”Managerial (Administrative).”
Which of these are Detective controls: Audit logs, IPS, IDS, System monitoring?,”Audit logs, IDS, and System monitoring. (IPS is preventive).”
Which concept ensures data has not been tampered with or modified?,”Integrity.”
Which concept uses strict identity verification, continuous monitoring, and least privilege?,”Zero Trust.”
Most reliable method to identify unauthorized physical access: Guard, Tape, Sensors, or Logs?,”Surveillance Tape (It is objective evidence).”
Which sensor uses changes in temperature to detect motion?,”Infrared sensor.”
What deception technology uses decoy items to divert attackers?,”Honeytoken.”
What plan is required to reverse a failed system update?,”Backout plan.”
If a change to one system causes outages in connected systems, this is due to…?,”Dependency.”
A sudden flood of previously blocked ICMP traffic suggests what issue?,”Misconfigured Access List (ACL).”
If you can access a system by Hostname but not IP after a change, what is the cause?,”The network diagram/DNS was not updated with the new IP.”
Which attack is defeated by using Salting?,”Rainbow Table attack.”
If you cannot decrypt a reply with the same key used to encrypt the sent message, you are using…?,”Asymmetric Cryptography.”
True/False: Stream ciphers require padding.,”False. Block ciphers require padding.”
Why are Asymmetric algorithms called Public Key algorithms?,”They use the Public Key as the focal point.”
What is the primary motivation of a Hacktivist?,”Political or social statement (e.g., defacing a site).”
Compare External vs Internal threat actors regarding sophistication.,”External actors often have higher sophistication to breach defenses, despite having less access.”
What is the motivation of a Nation-State actor?,”War, Espionage, or Strategic advantage.”
What is the motivation of Organized Crime?,”Financial Gain.”
A fake invoice email from a ‘manager’ is an example of what?,”Business Email Compromise (BEC).”
Phishing via SMS is called…?,”Smishing.”
Mimicking a trusted company’s emails/logos is called…?,”Brand Impersonation.”
Which vector bypasses firewalls via physical connection?,”Removable device (USB).”