EXAM FULLY SOLVED
Below are the steps in risk management framework. Put them in the right order. -
correct answer Step 1 : Establishing security goals and identifying threats
Step 2: Identify security gaps and additional security controls
Step 3: Implement security goals
Step 4: Assess the implemented security goals
Step 5: Approve the validated controls
Step 6: Monitor the security controls and threats environments for change
Which of the following controls is/are for electric power issues when considering internal
support systems?
* Select all that apply
Surge protectors, circuit breaker, GFCI* outletonline/standby UPS, voltage
regulator/power line conditionerdelayed power on & shutdown sequenceshielded
line/cable/conduit, distance to interference sources - correct answer - Delayed power on
& shutdown sequence
- Plenum rated cable
- Surge protectors
- UPS
True or False?
The best environment design for physical security is a design based on the CPTED
approach supplemented with some target-hardening design elements. - correct answer
True
Security controls can be categorized by their primary purposes. Which of the following
is/are NOT one of the purposes?
* Select all that apply. - correct answer - Recover
- Detect
- Transfer
- Deter
A(n) __________ is someone who is motivated to attack our assets. - correct answer
threat agent
Security controls can be categorized by their primary purposes. Which of the following
is/are NOT one of the purposes?
* Select all that apply. - correct answer - Prevent
- Avoid*
- Deflect*
- Accept*
Which of the following is NOT included in the main strategies of CPTED? - correct
answer Intimidating Fortification