(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which security mechanism mainly relies on technology to enforce access controls?

  1. Physical Barriers

  2. Technical Controls

  3. Administrative Controls

  4. Legal Controls

The correct answer is: Technical Controls

The correct choice emphasizes the role of technology in enforcing access controls, which is the defining characteristic of technical controls. These controls use hardware and software solutions to manage who can access information and systems, ensuring that only authorized users can gain entry or interact with resources. Examples include firewalls, encryption, intrusion detection systems, and access control lists, all of which are specifically designed to protect data and prevent unauthorized access through technology. In contrast, physical barriers rely on tangible measures to restrict access, such as locks and guards. Administrative controls depend on policies, procedures, and protocols set by an organization to govern behavior and access to information, emphasizing human factors rather than technological means. Legal controls involve laws and regulations that dictate what is permissible regarding data access and privacy enforcement, often requiring compliance but not actively enforcing access on a technical level. Thus, the focus on technology as a primary enforcer of access rights clearly identifies technical controls as the correct choice in this context.