Which of the following BEST meets their goal?
A company is trying to implement physical deterrent controls to improve the overall security posture of
their data center. Which of the following BEST meets their goal?
Which of the following mitigation methods would provide the MOST physical protection?
Pete, an IT Administrator, needs to secure his server room. Which of the following mitigation methods
would provide the MOST physical protection?
Which of the following is being described?
Visitors entering a building are required to close the back door before the front door of the same entry
room is open. Which of the following is being described?
Which of the following does this describe?
A company is installing a new security measure that would allow one person at a time to be authenticated
to an area without human interaction. Which of the following does this describe?
Which of the following security measures can be put in place to mitigate the issue until a new key card system
Key cards at a bank are not tied to individuals, but rather to organizational roles. After a break in, it
becomes apparent that extra efforts must be taken to successfully pinpoint who exactly enters secure
areas. Which of the following security measures can be put in place to mitigate the issue until a new key
card system can be installed?
Which of the following controls will allow the organization to provide automated notification of item removal?
A datacenter requires that staff be able to identify whether or not items have been removed from the
facility. Which of the following controls will allow the organization to provide automated notification of
item removal?
Which of the following MUST be prevented in order for this policy to be effective?
Datacenter access is controlled with proximity badges that record all entries and exits from the
datacenter. The access records are used to identify which staff members accessed the data center in the
event of equipment theft. Which of the following MUST be prevented in order for this policy to be
effective?
Which of the following will address this requirement?
Due to issues with building keys being duplicated and distributed, a security administrator wishes to
change to a different security control regarding a restricted area. The goal is to provide access based
upon facial recognition. Which of the following will address this requirement?
Which of the following should be implemented?
A security administrator wants to deploy a physical security control to limit an individual’s access into a
sensitive area. Which of the following should be implemented?
Which of the following security measures can be put in place to mitigate the issue from occurring in the futur
After running into the data center with a vehicle, attackers were able to enter through the hole in the
building and steal several key servers in the ensuing chaos. Which of the following security measures can
be put in place to mitigate the issue from occurring in the future?