New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 6 Question 10 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 10
Topic #: 6
[All CSSLP Questions]

In which type of access control do user ID and password system come under?

Show Suggested Answer Hide Answer
Suggested Answer: B

Technical access controls include IDS systems, encryption, network segmentation, and antivirus controls.

Answer D is incorrect. The policies and procedures implemented by an organization come under administrative access controls.

Answer A is incorrect. Security guards, locks on the gates, and alarms come under physical access controls.

Answer C is incorrect. There is no such type of access control as power control.


Contribute your Thoughts:

0/2000 characters
Hortencia
4 months ago
100% agree with B, that's the standard definition!
upvoted 0 times
...
Stephania
4 months ago
Wait, are we sure it's not administrative? Seems a bit confusing.
upvoted 0 times
...
Elouise
4 months ago
User ID and password are classic examples of technical access control.
upvoted 0 times
...
Bulah
4 months ago
I thought it was D, but I guess that makes sense.
upvoted 0 times
...
Celestina
5 months ago
Definitely B, it's all about technical controls!
upvoted 0 times
...
Dominic
5 months ago
I’m a bit confused; I thought physical access was about locks and keys, not passwords. Maybe it’s technical?
upvoted 0 times
...
Lyda
5 months ago
I'm leaning towards administrative controls because they involve policies, but user IDs and passwords seem more technical to me.
upvoted 0 times
...
Winifred
5 months ago
I remember studying access control types, and I feel like this question is similar to one we practiced in class.
upvoted 0 times
...
Jina
5 months ago
I think user ID and password systems are more related to technical controls, but I'm not entirely sure.
upvoted 0 times
...
Carmelina
5 months ago
This question seems pretty straightforward. I think the key is to focus on the guidelines that the HR department can use to mitigate insider threats.
upvoted 0 times
...
Louvenia
5 months ago
I'm a bit confused on this one. I'll need to review my notes and make sure I understand the key factors at play here.
upvoted 0 times
...

Save Cancel