Which of the following is being described?
Visitors entering a building are required to close the back door before the front door of the same
entry room is open. Which of the following is being described?
Which of the following is being described?
Visitors entering a building are required to close the back door before the front door of the same
entry room is open. Which of the following is being described?
Which of the following does this describe?
A company is installing a new security measure that would allow one person at a time to be
authenticated to an area without human interaction. Which of the following does this describe?
Which of the following does this describe?
A company is installing a new security measure that would allow one person at a time to be
authenticated to an area without human interaction. Which of the following does this describe?
Which of the following security measures can be put in place to mitigate the issue until a new key card system
Key cards at a bank are not tied to individuals, but rather to organizational roles. After a break in, it
becomes apparent that extra efforts must be taken to successfully pinpoint who exactly enters
secure areas. Which of the following security measures can be put in place to mitigate the issue
until a new key card system can be installed?
Which of the following controls will allow the organization to provide automated notification of item removal?
A datacenter requires that staff be able to identify whether or not items have been removed from
the facility. Which of the following controls will allow the organization to provide automated
notification of item removal?
Which of the following controls will allow the organization to provide automated notification of item removal?
A datacenter requires that staff be able to identify whether or not items have been removed from
the facility. Which of the following controls will allow the organization to provide automated
notification of item removal?
Which of the following MUST be prevented in order for this policy to be effective?
Datacenter access is controlled with proximity badges that record all entries and exits from the
datacenter. The access records are used to identify which staff members accessed the data
center in the event of equipment theft. Which of the following MUST be prevented in order for this
policy to be effective?
Which of the following will address this requirement?
Due to issues with building keys being duplicated and distributed, a security administrator wishes
to change to a different security control regarding a restricted area. The goal is to provide access
based upon facial recognition. Which of the following will address this requirement?
Which of the following will address this requirement?
Due to issues with building keys being duplicated and distributed, a security administrator wishes
to change to a different security control regarding a restricted area. The goal is to provide access
based upon facial recognition. Which of the following will address this requirement?