Home » Certification, CompTIA, Security, Security+, Technology

Security + Question of the Week

Author: James Michael Stewart 22 March 2013 786 views No Comments

Which of the following is implemented via technical control?

  1. Business continuity planning
  2. Principle of least privilege
  3. Background checks
  4. Perimeter breach detection


The correct answer is 2.

A technical control is any security mechanism implemented with computer hardware or software. The principle of least privilege is implemented though software by setting authorization  of users on objects so that subjects can only perform the tasks necessary for job responsibilities. Business continuity planning and background checks are administrative controls, and perimeter breach detection is a physical control.

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...

Leave your response!

Add your comment below, or trackback from your own site. You can also subscribe to these comments via RSS.

Be nice. Keep it clean. Stay on topic. No spam.

You can use these tags:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

This is a Gravatar-enabled weblog. To get your own globally-recognized-avatar, please register at Gravatar.