New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSAP Exam - Topic 2 Question 37 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 37
Topic #: 2
[All ISSAP Questions]

An access control secures the confidentiality, integrity, and availability of the information and data of an organization. In which of the following categories can you deploy the access control? Each correct answer represents a part of the solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, D

Preventive access control: It prevents unwanted or unauthorized activities from happening.

Detective access control: It searches for unwanted or unauthorized activities.

Corrective access control: It helps the systems in getting their normal status after an unwanted or unauthorized activity has occurred.

Answer option C is incorrect. It is a category of implementation of the access control. The administrative access control is a set of policies and

procedures that are defined by an organization's security policy in order to implement an access control.


Contribute your Thoughts:

0/2000 characters
Jerry
4 months ago
Not sure about that, I thought detective was more about monitoring.
upvoted 0 times
...
Corinne
4 months ago
I think preventive is the most crucial one here.
upvoted 0 times
...
Owen
4 months ago
Wait, can corrective access control really be a thing?
upvoted 0 times
...
Harrison
4 months ago
Totally agree, administrative is also super important!
upvoted 0 times
...
Curtis
5 months ago
Detective and preventive are key for access control.
upvoted 0 times
...
Angelyn
5 months ago
I’m torn about corrective access control. It seems more about responding to incidents rather than preventing them, but maybe it still applies?
upvoted 0 times
...
Julieta
5 months ago
I practiced a similar question last week, and I think preventive access control is crucial for protecting data. I’m pretty confident about that one.
upvoted 0 times
...
Maryln
5 months ago
I'm a bit unsure about detective access control. I feel like it might not directly secure confidentiality or integrity, but I could be wrong.
upvoted 0 times
...
Benedict
5 months ago
I think I remember that administrative access control is definitely one of the categories we can use. It seems to fit the definition well.
upvoted 0 times
...
Lynette
5 months ago
Okay, let's see. I know ifconfig can activate/deactivate interfaces and modify the routing table, so B and C are good. And it can definitely change IP addresses, so D is correct. I'm not sure about A and E, though. Guess I'll have to eliminate the ones I'm unsure of.
upvoted 0 times
...
Gianna
5 months ago
Hmm, I'm not too familiar with the Meraki MV Dashboard, so I'll have to think this through. Maybe I can eliminate some of the options that don't sound quite right.
upvoted 0 times
...
Tracie
5 months ago
I'm pretty confident that the correct answer is A. The BYOD environment shifts more responsibility to users, so the organization needs to ensure they comply with policies and procedures.
upvoted 0 times
...
Fidelia
5 months ago
Didn't we practice a question about control charts where p and n were more relevant? I think they relate to the proportions of defects.
upvoted 0 times
...

Save Cancel