nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #272

CERTIFIED-IN-CYBERSECURITY Question #272: Real Exam Question with Answer & Explanation

The correct answer is C: Using CCTV cameras to monitor unauthorized access. Using CCTV cameras to monitor unauthorized access is an example of a technical security control as it involves the use of technology to control user access (see ISC2 Study Guide, Chapter 1, Module 1). Technical security controls are designed to protect the confidentiality, integr

Security Principles

Question

Which of the following is an example of a technical security control?

Options

  • AConducting user security awareness training
  • BEstablishing an acceptable usage policy
  • CUsing CCTV cameras to monitor unauthorized access
  • DEstablishing a BYOD policy

Explanation

Using CCTV cameras to monitor unauthorized access is an example of a technical security control as it involves the use of technology to control user access (see ISC2 Study Guide, Chapter 1, Module 1). Technical security controls are designed to protect the confidentiality, integrity, and availability of an organization's systems and data. Establishing an acceptable usage policy, conducting user security awareness training, and establishing a BYOD policy are examples of administrative security controls, which are designed to ensure that users comply with the organization's security policies and procedures

Topics

#Security Controls#Technical Controls#Control Types#Security Principles

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions