This type of control is focused around noticing or discovering something during or after it has already happened
Detective control
Both FTP ports
20/21
PII
Personal Identifiable Information
BYOD
Bring Your Own Device
When someone follows you closely to gain access to a location that they do not have authorization to enter into.
Shoulder surfing/ Piggy backing
This type of control discourages a person from doing something but may not be able to actually stop them from doing it.
Deterrent Control
Telnet
23
ACL
Access Control List
NIC
Network Interface Card
This would be the correct port to block if you wanted to disable anyone from being able to remote into your computers desktop.
3389
This type of control restores the system back to the state of confidentiality, integrity, and availability without retrieving backups, after unauthorized activity occurs.
Corrective Control
Port 53
DNS
NIDS
Network Intrusion Detection System
NAC
Network Access Control
The correct response if Jeff Bezos, emails you telling you to click a link to get free V-bucks.
Ignore it.
Retrieving the servers data from a backup and return it to a previous known good state known as this type of control.
Recovery Control
143
IMAP4
LDAP
Lightweight Directory Access Control
TFTP
Trivial File Transfer Protocol
This server would need to be checked if an IP config shows you an address of 169.254.0.0
DHCP server
This type of control may temporarily make up for the issue without necessarily outright solving said issue.
Compensative Control
Syslog
514
Both Versions of MAC
Media Access Control
Also Mandatory Access control
NIST
National Institute of Standards & Technology