Which aspect includes network infrastructure, endpoints, servers, identity management, vulnerability management, monitoring and logging?

Study for the CCST Cybersecurity Test. Study with flashcards and multiple choice questions, each question has hints and explanations. Get ready for your exam!

Multiple Choice

Which aspect includes network infrastructure, endpoints, servers, identity management, vulnerability management, monitoring and logging?

Explanation:
In cybersecurity, controls are grouped into physical, administrative, and technical categories. The items listed—network infrastructure, endpoints, servers, identity management, vulnerability management, monitoring and logging—are all implemented through technology: hardware, software, configurations, and automated processes. They protect systems directly by enforcing access, detecting threats, and managing patches and logs. That makes them technical controls. Physical controls cover things like locks and surveillance; administrative controls cover policies and procedures; operational controls cover day-to-day processes. The technology-based safeguards described clearly fit the technical controls category.

In cybersecurity, controls are grouped into physical, administrative, and technical categories. The items listed—network infrastructure, endpoints, servers, identity management, vulnerability management, monitoring and logging—are all implemented through technology: hardware, software, configurations, and automated processes. They protect systems directly by enforcing access, detecting threats, and managing patches and logs. That makes them technical controls. Physical controls cover things like locks and surveillance; administrative controls cover policies and procedures; operational controls cover day-to-day processes. The technology-based safeguards described clearly fit the technical controls category.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy