CERTIFIED-IN-CYBERSECURITY · Question #380
CERTIFIED-IN-CYBERSECURITY Question #380: Real Exam Question with Answer & Explanation
The correct answer is B: A firewall. A firewall is an example of a control in a network environment. A firewall is a network security device that creates a barrier between a trusted internal network and untrusted external networks, such as the Internet (see ISC2 Study Guide Chapter 3, Module 1). For example, an orga
Question
In a network environment, which of the following is an example of a security control?
Options
- AUser credentials
- BA firewall
- CA criminal evidence
- DAn access log
Explanation
A firewall is an example of a control in a network environment. A firewall is a network security device that creates a barrier between a trusted internal network and untrusted external networks, such as the Internet (see ISC2 Study Guide Chapter 3, Module 1). For example, an organization might deploy a firewall to prevent unauthorized access to its internal network by monitoring all incoming and outgoing traffic and blocking or allowing it based on the organization's security policies. In contrast, user credentials are not a control, but rather a form of identification and authentication. They are used to verify a user's identity and determine access rights, but they do not control network traffic. An audit trail is also not a control. An access log is a record of all requests for access to a particular resource, such as a network or file. While it can be used to monitor network activity and detect potential security incidents, it does not actively control network traffic. It is a monitoring tool rather than a control tool.
Topics
Community Discussion
No community discussion yet for this question.