Which of the following is an example of a technical security control?
📖 About this Domain
This domain focuses on maintaining operational resilience against disruptive events. It details the concepts and processes behind business continuity, disaster recovery, and incident response.
🎓 What You Will Learn
- Understand the purpose of a Business Continuity Plan (BCP) and its core component, the Business Impact Analysis (BIA).
- Learn the function of a Disaster Recovery Plan (DRP) and the characteristics of recovery sites like hot, warm, and cold sites.
- Grasp the phases of the incident response lifecycle, from preparation and identification to containment and lessons learned.
- Differentiate the specific goals and scopes of BC, DR, and incident response within an organization's security posture.
🛠️ Skills You Will Build
- Ability to identify critical business functions and their dependencies using Business Impact Analysis (BIA) principles.
- Competency in evaluating disaster recovery strategies, including the selection of appropriate recovery sites.
- Skill in applying the incident response lifecycle to manage and mitigate security incidents effectively.
- Capability to contribute to the creation and maintenance of organizational BCP and DRP documentation.
💡 Top Tips to Prepare
- Memorize the definitions and objectives of Recovery Time Objective (RTO) and Recovery Point Objective (RPO).
- Understand the exact sequence and purpose of each phase in the incident response lifecycle.
- Clearly distinguish the roles of a BCP (keeps business running) versus a DRP (recovers IT systems after a disaster).
- Practice associating specific scenarios with the correct response framework: BC, DR, or incident response.
📖 About this Domain
This domain covers the foundational concepts that form the basis of information security. It introduces core principles like the CIA triad, risk management, and security controls. Understanding these principles is critical for any cybersecurity role.
🎓 What You Will Learn
- You will learn the core tenets of information security, including confidentiality, integrity, and availability (CIA triad).
- You will learn the concepts of identification, authentication, authorization, and accountability (IAAA) for access control.
- You will learn risk management processes, including risk identification, assessment, and treatment.
- You will learn the purpose and types of security controls, such as technical, administrative, and physical controls.
🛠️ Skills You Will Build
- You will build the skill to apply the CIA triad to evaluate the security posture of assets.
- You will build the skill to recognize how IAAA principles are implemented in access control systems.
- You will build the skill to identify components within a risk management framework.
- You will build the skill to differentiate between various security control categories and their implementation.
💡 Top Tips to Prepare
- Memorize the definitions and components of the CIA triad and IAAA as they are foundational concepts.
- Focus on understanding the risk management lifecycle, from asset identification to control implementation.
- Practice classifying different security controls into technical, administrative, and physical categories.
- Review the (ISC)² Code of Ethics canons and understand their application to professional conduct.
📖 About this Domain
Security Operations covers the foundational processes and procedures for protecting organizational assets. This domain focuses on data security, system monitoring, and configuration management. It details how security teams detect, respond to, and recover from security incidents.
🎓 What You Will Learn
- You will learn data security concepts, including data classification, encryption, and data handling policies.
- You will learn logging and monitoring concepts, such as using a Security Information and Event Management (SIEM) for event correlation.
- You will learn configuration management to establish secure baselines and manage system hardening.
- You will learn incident response (IR) processes and disaster recovery (DR) planning for business continuity.
🛠️ Skills You Will Build
- You will build skills to analyze security events using logs from firewalls, IDS/IPS, and SIEM systems.
- You will build skills to apply security policies for data handling, access control, and asset management.
- You will build skills in configuration management, including applying secure baselines and managing configuration drift.
- You will build skills to support incident response (IR) and disaster recovery (DR) activities.
💡 Top Tips to Prepare
- Focus on the incident response lifecycle and the steps within change management processes.
- Understand the function of log aggregation and correlation within a Security Information and Event Management (SIEM) platform.
- Connect abstract concepts like secure baselining and data classification to practical operational security tasks.
- Review the role of physical security controls as part of a defense-in-depth security posture.
📖 About this Domain
This domain introduces the core concepts of controlling access to assets. It covers the implementation of both physical and logical controls. The focus is on the principles of authentication, authorization, and accountability (AAA).
🎓 What You Will Learn
- The function of physical access controls such as locks, fencing, and security guards.
- The components of logical access controls, including identification, authentication, authorization, and accountability.
- Different access control models like Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Role-Based Access Control (RBAC).
- The purpose and application of various authentication factors and methods.
🛠️ Skills You Will Build
- Ability to differentiate between various physical and logical access control mechanisms.
- Competency in applying the principle of least privilege to security scenarios.
- Skill in identifying the components of the AAA security framework.
- Understanding of how to select appropriate access control models for specific environments.
💡 Top Tips to Prepare
- Memorize the definitions and differences between DAC, MAC, and RBAC models.
- Clearly distinguish between the concepts of authentication and authorization.
- Focus on the principle of least privilege as it applies to all access control decisions.
- Practice identifying examples of physical controls versus logical controls.
📖 About this Domain
This domain covers computer networking concepts, protocols, and infrastructure devices. It details the OSI and TCP/IP models, common network-based attacks, and the security controls used to protect network traffic and assets.
🎓 What You Will Learn
- You will learn to compare the layers and functions of the OSI and TCP/IP models, including the process of data encapsulation.
- You will learn the purpose of core networking protocols such as TCP, UDP, IP, DNS, and DHCP that enable network communication.
- You will learn about network security infrastructure components like firewalls, IDS/IPS, Network Access Control (NAC), and VPNs.
- You will learn to identify common network-based attacks including Denial-of-Service (DoS), Man-in-the-Middle (MitM), and IP spoofing.
🛠️ Skills You Will Build
- You will build the skill to map network protocols and devices to the correct layers of the OSI and TCP/IP models.
- You will build the skill to differentiate between connection-oriented (TCP) and connectionless (UDP) transport protocols.
- You will build the skill to identify the appropriate network security control for a given scenario, such as using a firewall for packet filtering.
- You will build the skill to recognize attack vectors that exploit network protocols and infrastructure.
💡 Top Tips to Prepare
- Focus on memorizing the OSI and TCP/IP layers and the key protocols, or PDUs, that operate at each layer.
- Understand the core function of common ports and protocols, especially the difference between TCP and UDP.
- Visualize network traffic flow through devices like routers, switches, and firewalls to understand security choke points.
- Practice associating specific network attacks, like port scanning, with the defensive tools used to detect or prevent them, like an IDS or firewall.
Premium Access Includes
- ✓ Quiz Simulator
- ✓ Exam Mode
- ✓ Progress Tracking
- ✓ Question Saving
- ✓ Flash Cards
- ✓ Drag & Drops
- ✓ 3 Months Access
- ✓ PDF Downloads