(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What term is used to describe the management, operational, and technical controls that protect the confidentiality, integrity, and availability of an information system?

  1. Security Standards

  2. Security Protocols

  3. Security Controls

  4. Security Measures

The correct answer is: Security Controls

The term that describes the management, operational, and technical controls designed to protect the confidentiality, integrity, and availability of an information system is known as Security Controls. This designation encompasses various mechanisms, policies, and practices that organizations implement to safeguard their information systems from threats and vulnerabilities. Security controls can be classified into three categories: management controls, which involve the organizational policies and procedures; operational controls, which consist of processes and practices that ensure security is integrated into day-to-day operations; and technical controls, which include the tools and technologies that enforce security measures, such as firewalls and encryption. Understanding this term is crucial in the field of cybersecurity, as it provides a framework for organizations to assess their security posture and implement effective strategies to mitigate risks to sensitive information.