Your company has invested an increasing amount in security due to the changing threat landscape. The company is trying to reduce costs, and the CFO has queried the security budget. At the same time, you as the security practitioner are actively requesting additional funding to support new initiatives. These initiatives will mitigate several security incidents that have occurred due to ineffective
controls. You assess the current controls framework and provide recommendations on whether preventative, detective, or corrective controls should be implemented. How should you explain which controls to implement?
A. While corrective controls are more costly to implement, they are only needed for real attacks on high value assets. Put controls in place after a real attack has occurred.
B. Detective controls are less costly to implement than preventative controls and should be encouraged wherever possible; corrective controls are used during an event or security incident; and preventative controls are hard to achieve in practice with current market offerings.
C. Use preventative controls as this will prevent security incidents from occurring in the first place. Detective and corrective controls are redundant compensating controls and are not required if preventative controls are implemented.
D. Use preventative controls before an event occurs; use detective controls during an event; and use corrective controls after an event has occurred. Use a combination of controls.
D
Explanation: You should explain that the company should use preventative controls before an event occurs, use detective controls during an event, and use corrective controls after an event has occurred. Therefore , you should use a combination of controls.
You might also like to view...
The process of safekeeping and recordkeeping of computer forensics evidence is known as:
a. Chain of custody b. Chain of evidence c. Burden of proof d. Best evidence rule
A function may return a pointer, but the programmer must ensure that the pointer
A) is pointing to an object that is still valid after the return of the function. B) has been assigned an address. C) was received as a parameter by the function. D) has not previously been returned by another function. E) None of the above
Answer the following questions true (T) or false (F)
1. To read a character at a time, or to write a character at a time, declare a character variable ch and write this: cin >> ch; 2. Indexing for Standard string objects does not range check/
Which Windows utility program is used to exit out of a program that has stopped responding?
A) Task Manager B) Program Manager C) Disk Cleanup D) Disk Defragmenter