Which control includes installing devices like firewalls, IDS, IPS, authentication schemes, encryption, auditing or monitoring software, and more?

Study for the CompTIA SecurityX Test. Equip yourself with comprehensive flashcards and multiple choice questions that include hints and explanations. Gear up for your certification exam!

Multiple Choice

Which control includes installing devices like firewalls, IDS, IPS, authentication schemes, encryption, auditing or monitoring software, and more?

Explanation:
This question tests the distinction between control types: physical versus logical (technical) versus administrative. The items listed—firewalls, intrusion detection systems, intrusion prevention systems, authentication methods, encryption, and auditing or monitoring software—are implemented with software and hardware to enforce how systems and data are accessed, protected, and observed. That makes them logical (technical) controls. Physical controls, by contrast, are tangible barriers and measures like locks, fences, cameras, and guards that prevent physical access. Administrative controls cover the governance side—policies, procedures, standards, and training that govern how security is operated. In practice, you’d use a mix of all three, but the technologies described here specifically serve as logical/technical controls that enforce access, protect information, and monitor activity.

This question tests the distinction between control types: physical versus logical (technical) versus administrative. The items listed—firewalls, intrusion detection systems, intrusion prevention systems, authentication methods, encryption, and auditing or monitoring software—are implemented with software and hardware to enforce how systems and data are accessed, protected, and observed. That makes them logical (technical) controls. Physical controls, by contrast, are tangible barriers and measures like locks, fences, cameras, and guards that prevent physical access. Administrative controls cover the governance side—policies, procedures, standards, and training that govern how security is operated. In practice, you’d use a mix of all three, but the technologies described here specifically serve as logical/technical controls that enforce access, protect information, and monitor activity.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy