Page 1536 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1536
8. D. Lighting is the most common form of perimeter security device
or mechanism. Your entire site should be clearly lit. This provides
for easy identification of personnel and makes it easier to notice
intrusions.
9. A. Security guards are usually unaware of the scope of the
operations within a facility, which supports confidentiality of those
operations and thus helps reduce the possibility that a security
guard will be involved in the disclosure of confidential information.
10. B. The most common cause of failure for a water-based system is
human error. If you turn off the water source after a fire and forget
to turn it back on, you’ll be in trouble for the future. Also, pulling
an alarm when there is no fire will trigger damaging water release
throughout the office.
11. C. Key locks are the most common and inexpensive form of
physical access control device. Lighting, security guards, and fences
are all much more costly.
12. D. A capacitance motion detector senses changes in the electrical
or magnetic field surrounding a monitored object.
13. A. There is no such thing as a preventive alarm. Alarms are always
triggered in response to a detected intrusion or attack.
14. B. No matter what form of physical access control is used, a
security guard or other monitoring system must be deployed to
prevent abuse, masquerading, and piggybacking. Espionage cannot
be prevented by physical access controls.
15. C. Human safety is the most important goal of all security
solutions.
16. B. The humidity in a computer room should ideally be from 40 to
60 percent.
17. D. Destruction of data stored on hard drives can be caused by 1,500
volts of static electricity.
18. A. Water is never the suppression medium in Type B fire
extinguishers because they are used on liquid fires.

