Test Question: πŸ” Understanding Operational Controls – CISSP Edition

 Thanks! Let’s break this down CISSP-blog style using the question from your new image.


πŸ›‘️ Understanding Operational Controls – CISSP Edition

CISSP Domain: 1 – Security and Risk Management
Topic: Types of Security Controls (Administrative, Technical, Operational)


❓ The Question Recap:

Which of the following is the BEST example of an operational control for security operations?

The Choices:

  • A: Fire suppression systems ❌

  • B: Access control systems ❌ (Your Answer)

  • C: Vulnerability scanning tools ❌

  • D: ✅ Intrusion Detection Systems (Correct Answer)


✅ Why D (Intrusion Detection Systems) is Correct:

Intrusion Detection Systems (IDS) are detective and operational controls.
They monitor systems and networks for malicious activity or policy violations and alert security teams in real-time.

  • Operational Control = Implemented and executed by people (security staff, SOC, etc.)

  • IDS supports day-to-day operations and aligns with security procedures


❌ Why the Other Answers Are Wrong:

A: Fire Suppression Systems

  • πŸ”₯ These are environmental controls (protect physical assets)

  • Not tied to daily security operations; more part of facility safety

B: Access Control Systems

  • πŸ›‘ These are technical (logical) controls, not operational

  • Access mechanisms (like badges or biometrics) are implemented via tech, not day-to-day human processes

C: Vulnerability Scanning Tools

  • πŸ§ͺ These are preventive technical controls

  • Automated scanners detect flaws before they’re exploited—not operational in the sense of security management actions


🧠 Tip for the Exam:

Think of Operational Controls as:

"Things people do to enforce security policies and procedures."

Includes:

  • Monitoring (e.g., IDS)

  • Security awareness training

  • Incident response processes

  • Change management


πŸ“Š Flash Review Table:

Control Type Description Examples
Administrative Policies, Procedures Security training, hiring practices
Technical Automated, tech-based Firewalls, access control mechanisms
Operational Human-executed, day-to-day IDS, monitoring, backups, security guards

🎯 CISSP Takeaway:

Operational controls are people-driven measures to ensure that security is enforced in everyday activities. IDS fits this perfectly—it’s a detective control run as part of daily monitoring operations in the SOC.


Let me know if you’d like a blog-formatted export, flashcard version, or a cheat sheet for all control types.

Comments

Popular posts from this blog

🧭 CISSP Study Note: Guidelines

πŸ’Έ CISSP Study Note: Risk Transference

πŸ“ CISSP Study Note: Standards