Academy Login

Weekly CISSP Practice

Exam Questions

Week 22 - Question 1

Scenario: You notice that an unauthorized user has gained access to a privileged account. What type of control should be implemented to alert you of this in the future?

 

A.  Preventive Control

B.  Detective Control

C.  Deterrent Control

D.  Compensating Control

 

Answer:  B

 

Detailed Explanations

A. Preventive Control

A preventive control is designed to thwart an attack before it succeeds.

  • The Goal: To keep the "bad thing" from happening. Examples include firewalls, biometric locks, and Multi-Factor Authentication (MFA).

  • Why it's not the Answer: While a preventive control might have stopped the unauthorized user from getting in, the question specifically asks for a control that will alert you. Preventive controls are often "silent" when they work (e.g., a firewall just drops a packet without necessarily sending an emergency page to the admin).

B. Detective Control

Detective controls are designed to identify and record an incident as it happens or after it has occurred.

  • Why it's the Answer: The keyword in the question is alert. Detective controls—such as Intrusion Detection Systems (IDS), motion sensors, and security log reviews—are the "eyes and ears" of your security infrastructure. They provide the necessary visibility to trigger an incident response.

  • Example: A SIEM (Security Information and Event Management) system that flags a "Privileged Account Login" from an unrecognized IP address is a classic detective control.

C. Deterrent Control

A deterrent control is intended to discourage a potential attacker by influencing their decision-making process.

  • The Goal: To make the attacker believe the "cost" or "risk" of the attack is too high. Examples include "No Trespassing" signs, visible security cameras, or login banners warning of prosecution.

  • The Limitation: Deterrents do not actually stop a determined attacker, nor do they provide a technical alert that a breach has successfully bypassed your defenses.

D. Compensating Control

A compensating control is a substitute control implemented when a primary security control is impossible or too expensive to deploy.

  • The Scenario: If your legacy system cannot support MFA (a preventive control), you might implement a compensating control like "stringent daily log review" (a detective control) or "restricting the system to a specific isolated VLAN."

  • Why it's not the Answer: While a compensating control could be detective in nature, "Compensating" describes the reason the control exists, not its function. The question is asking for the specific function of alerting.

 

Podcasts

Check out my weekly podcasts that delve deep into the relevant topics related to each of CISSP domains. In addition, I will go over specific questions and they can be interpreted and answered.

Listen Podcasts

CISSP Cyber Training Academy

Tired of not knowing how to study for the CISSP Exam? 

Check out the CISSP Cyber Training Academy to help you on your journey!

Learn about the Academy!

CISSP Cyber Training - YouTube

Check out my video collection on YouTube discussing all the details needed to help you pass the CISSP exam.   

Check out channel