nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #380

CERTIFIED-IN-CYBERSECURITY Question #380: Real Exam Question with Answer & Explanation

The correct answer is B: A firewall. A firewall is an example of a control in a network environment. A firewall is a network security device that creates a barrier between a trusted internal network and untrusted external networks, such as the Internet (see ISC2 Study Guide Chapter 3, Module 1). For example, an orga

Network Security Concepts

Question

In a network environment, which of the following is an example of a security control?

Options

  • AUser credentials
  • BA firewall
  • CA criminal evidence
  • DAn access log

Explanation

A firewall is an example of a control in a network environment. A firewall is a network security device that creates a barrier between a trusted internal network and untrusted external networks, such as the Internet (see ISC2 Study Guide Chapter 3, Module 1). For example, an organization might deploy a firewall to prevent unauthorized access to its internal network by monitoring all incoming and outgoing traffic and blocking or allowing it based on the organization's security policies. In contrast, user credentials are not a control, but rather a form of identification and authentication. They are used to verify a user's identity and determine access rights, but they do not control network traffic. An audit trail is also not a control. An access log is a record of all requests for access to a particular resource, such as a network or file. While it can be used to monitor network activity and detect potential security incidents, it does not actively control network traffic. It is a monitoring tool rather than a control tool.

Topics

#Security controls#Network security#Firewalls

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions