Which aspect includes network infrastructure, endpoints, servers, identity management, vulnerability management, monitoring and logging?

Prepare for the CCST Cybersecurity Test with comprehensive study guides and practice quizzes. Enhance your knowledge with interactive questions, complete with explanations and solutions. Excel in your exam with confidence!

Multiple Choice

Which aspect includes network infrastructure, endpoints, servers, identity management, vulnerability management, monitoring and logging?

Explanation:
In cybersecurity, controls are grouped into physical, administrative, and technical categories. The items listed—network infrastructure, endpoints, servers, identity management, vulnerability management, monitoring and logging—are all implemented through technology: hardware, software, configurations, and automated processes. They protect systems directly by enforcing access, detecting threats, and managing patches and logs. That makes them technical controls. Physical controls cover things like locks and surveillance; administrative controls cover policies and procedures; operational controls cover day-to-day processes. The technology-based safeguards described clearly fit the technical controls category.

In cybersecurity, controls are grouped into physical, administrative, and technical categories. The items listed—network infrastructure, endpoints, servers, identity management, vulnerability management, monitoring and logging—are all implemented through technology: hardware, software, configurations, and automated processes. They protect systems directly by enforcing access, detecting threats, and managing patches and logs. That makes them technical controls. Physical controls cover things like locks and surveillance; administrative controls cover policies and procedures; operational controls cover day-to-day processes. The technology-based safeguards described clearly fit the technical controls category.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy