(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


How do security controls differ from security countermeasures?

  1. Controls are generic; countermeasures are specific to threats

  2. Controls are less important than countermeasures

  3. Countermeasures are proactive; controls are reactive

  4. Controls apply to physical security; countermeasures apply to data

The correct answer is: Controls are generic; countermeasures are specific to threats

The distinction between security controls and security countermeasures is crucial for understanding how organizations implement cybersecurity strategies. Security controls are broad categories of measures that encompass various practices, processes, and technologies designed to protect information systems and data. These controls can be organizational, technical, or physical in nature and cover a wide range of areas such as access control, incident response, risk assessment, and compliance. On the other hand, security countermeasures are tailored or specific actions that are designed to neutralize particular threats or vulnerabilities. They are often implemented in response to identified risks and can include specific tools or techniques aimed at mitigating a known threat. For example, deploying a particular type of firewall to protect against a specific attack vector is a countermeasure. Understanding this distinction highlights that while controls provide a general framework for security governance and risk management, countermeasures are more focused and reactive to specific security challenges faced by an organization. This differentiation helps security professionals prioritize and implement measures effectively based on the specific threats that an organization faces.