(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What type of controls are primarily enacted by the information system hardware or software components?

  1. Management Controls

  2. Operational Controls

  3. Technical Controls

  4. Physical Controls

The correct answer is: Technical Controls

Technical controls are primarily enacted by the hardware or software components of an information system. These controls utilize technology to protect the integrity, confidentiality, and availability of information. They include mechanisms such as firewalls, encryption, intrusion detection systems, and access control systems. By employing such technology-based solutions, organizations can automate security processes and respond more effectively to potential threats. Management controls focus on the policies and procedures established by the organization to ensure proper governance and compliance, which often involves human oversight. Operational controls deal with the day-to-day operations of an organization and the procedures that operational staff must follow, usually involving manual processes or workflows. Physical controls refer to measures that physically protect an organization’s resources, such as locks, security guards, and surveillance systems. While all these controls cater to security needs, it is the technical controls that are directly implemented through hardware and software to secure systems and data.