Which of the following controls will allow the organization to provide automated notification of item removal?
A datacenter requires that staff be able to identify whether or not items have been removed from
the facility. Which of the following controls will allow the organization to provide automated
notification of item removal?
Which of the following controls will allow the organization to provide automated notification of item removal?
A datacenter requires that staff be able to identify whether or not items have been removed from
the facility. Which of the following controls will allow the organization to provide automated
notification of item removal?
Which of the following MUST be prevented in order for this policy to be effective?
Datacenter access is controlled with proximity badges that record all entries and exits from the
datacenter. The access records are used to identify which staff members accessed the data
center in the event of equipment theft. Which of the following MUST be prevented in order for this
policy to be effective?
Which of the following will address this requirement?
Due to issues with building keys being duplicated and distributed, a security administrator wishes
to change to a different security control regarding a restricted area. The goal is to provide access
based upon facial recognition. Which of the following will address this requirement?
Which of the following will address this requirement?
Due to issues with building keys being duplicated and distributed, a security administrator wishes
to change to a different security control regarding a restricted area. The goal is to provide access
based upon facial recognition. Which of the following will address this requirement?
Which of the following should be implemented?
A security administrator wants to deploy a physical security control to limit an individual’s access
into a sensitive area. Which of the following should be implemented?
Which of the following should be implemented?
A security administrator wants to deploy a physical security control to limit an individual’s access
into a sensitive area. Which of the following should be implemented?
Which of the following security measures can be put in place to mitigate the issue from occurring in the futur
After running into the data center with a vehicle, attackers were able to enter through the hole in
the building and steal several key servers in the ensuing chaos. Which of the following security
measures can be put in place to mitigate the issue from occurring in the future?
Which of the following security measures can be put in place to mitigate the issue from occurring in the futur
After running into the data center with a vehicle, attackers were able to enter through the hole in
the building and steal several key servers in the ensuing chaos. Which of the following security
measures can be put in place to mitigate the issue from occurring in the future?
Which of the following can BEST address this concern?
A system administrator has concerns regarding their users accessing systems and secured areas
using others’ credentials. Which of the following can BEST address this concern?