CCAK P# 242 Detective controls identify an incident in progress or uncover one that has already achieved its objective.
• Technical controls, such as IDSs (intrusion detection systems), monitor a network for malicious activity or policy violations.
• Any malicious activity or violation is typically reported or collected centrally using a SIEM (security information and event management) system.
• Administrative controls, such as reviewing logs, can help uncover suspicious access or activity leading to discovery of an incident.
• Physical controls, such as motion detection systems and closed-circuit television cameras, can detect the presence of an intruder after entry has occurred.
An example of a detective control that may be identified in a Software as a Service (SaaS) service provider is incident management.
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
sai_murthy
9 months, 1 week ago339dfab
1 month agoosys
9 months, 2 weeks agoMJORGER
1 year, 2 months agoAssilAbdulrahim
1 year, 3 months agoa5g
1 year, 7 months ago