Page 1535 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1535

Chapter 10: Physical Security Requirements




                1.  A. Physical security is the most important aspect of overall security.

                    Without physical security, none of the other aspects of security are
                    sufficient.

                2.  B. Critical path analysis can be used to map out the needs of an
                    organization for a new facility. A critical path analysis is the
                    process of identifying relationships between mission-critical
                    applications, processes, and operations and all of the supporting
                    elements.

                3.  B. A wiring closet is the infrastructure component often located in

                    the same position across multiple floors in order to provide a
                    convenient means of linking floor-based networks together.

                4.  D. Equal access to all locations within a facility is not a security-
                    focused design element. Each area containing assets or resources
                    of different importance, value, and confidentiality should have a
                    corresponding level of security restriction placed on it.

                5.  A. A computer room does not need to be human compatible to be

                    efficient and secure. Having a human-incompatible server room
                    provides a greater level of protection against attacks.

                6.  C. Hashing is not a typical security measure implemented in
                    relation to a media storage facility containing reusable removable
                    media. Hashing is used when it is necessary to verify the integrity
                    of a dataset, while data on reusable removable media should be
                    removed and not retained. Usually the security features for a media

                    storage facility include using a librarian or custodian, using a
                    check-in/check-out process, and using sanitization tools on
                    returned media.

                7.  C. A mantrap is a double set of doors that is often protected by a
                    guard and used to contain a subject until their identity and
                    authentication is verified.
   1530   1531   1532   1533   1534   1535   1536   1537   1538   1539   1540