PrepAway - Latest Free Exam Questions & Answers

Which one of the following can be identified when exceptions occur using operations security detective control

Which one of the following can be identified when exceptions occur using operations security
detective controls?

PrepAway - Latest Free Exam Questions & Answers

A.
Unauthorized people seeing confidential reports.

B.
Unauthorized people destroying confidential reports.

C.
Authorized operations people performing unauthorized functions.

D.
Authorized operations people not responding to important console messages.

Explanation:
C is the one that makes the most sense.
[Operation Security] Detective Controls are used to detect an error once it has occurred. Unlike
preventative controls, these controls operate after the fact and can be used to track an
unauthorized transaction for prosecution, or to lessen an error’s impact on the system by
identifying it quickly. An example of this type of control is an audit trail. -Ronald Krutz The CISSP
PREP Guide (gold edition) pg 299

One Comment on “Which one of the following can be identified when exceptions occur using operations security detective control


Leave a Reply