exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 43 discussion

Actual exam question from ISC's CISSP
Question #: 43
Topic #: 1
[All CISSP Questions]

The existence of physical barriers, card and personal identification number (PIN) access systems, cameras, alarms, and security guards BEST describes this security approach?

  • A. Access control
  • B. Security information and event management (SIEM)
  • C. Defense-in-depth
  • D. Security perimeter
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RVoigt
Highly Voted 2 years, 1 month ago
Selected Answer: D
CISSP Official Study Guide pg 73 - Defense in depth includes administrative, technical (logical) and physical controls. What's listed is only physical controls. Answer is D.
upvoted 14 times
CCNPWILL
10 months ago
So a PIN number is a physical control? The correct answer is C my guy.
upvoted 2 times
Ramye
9 months, 2 weeks ago
Yes , the PIN for the card that you need to use to get into the building.
upvoted 1 times
...
...
jens23
1 year, 9 months ago
Exactly!
upvoted 2 times
...
...
GenesisTech
Highly Voted 2 years, 5 months ago
Selected Answer: C
MFA + physical layer. (defense in depth)
upvoted 7 times
jackdryan
1 year, 11 months ago
C is correct
upvoted 3 times
...
...
Imranbhatti
Most Recent 3 weeks, 4 days ago
Selected Answer: D
The correct answer is D. Security perimeter. A security perimeter involves the use of physical and logical measures to protect the boundaries of a secure area. This includes physical barriers, card and PIN access systems, cameras, alarms, and security guards, all of which are designed to prevent unauthorized access and detect any security breaches. Option C, "Defense-in-depth," is incorrect in this context because it refers to a layered security strategy that employs multiple security measures to protect information and systems. While defense-in-depth can include physical security measures, it also encompasses a wide range of other controls, such as technical, administrative, and procedural safeguards. The scenario described focuses specifically on physical security measures like barriers, access systems, cameras, alarms, and security guards, which are best categorized under the concept of a security perimeter. This term specifically addresses the physical boundaries and measures used to protect a secure area.
upvoted 1 times
...
CKaraf
3 weeks, 4 days ago
Selected Answer: D
D. Not C as there is no mention for network security for example
upvoted 1 times
...
iRyae
1 month, 2 weeks ago
Selected Answer: D
While defense-in-depth includes perimeter security, the description focuses specifically on the outer layer of security: physical barriers, card/PIN access, cameras, alarms, and guards. These elements work together to control and monitor access to a secured area, which is the core concept of a security perimeter. Defense-in-depth would encompass multiple layers of security beyond just the perimeter.
upvoted 1 times
...
easyp
2 months ago
Selected Answer: C
The correct answer is: C. Defense-in-depth Explanation: The scenario describes multiple layers of security controls designed to protect an organization's assets. This approach is known as defense-in-depth, which involves implementing various types of security measures at different levels to create overlapping defenses. The goal is to ensure that if one security measure is bypassed, others remain in place to mitigate the risk. Breakdown of Components in the Scenario: Physical barriers: Prevent unauthorized access to facilities. Card and PIN access systems: Provide an additional layer of authentication. Cameras and alarms: Detect and deter unauthorized activities. Security guards: Act as a human layer of enforcement and monitoring. Each of these components contributes to an overall strategy of layering security to protect against a range of threats.
upvoted 1 times
...
lifre
2 months, 3 weeks ago
Selected Answer: A
In my opinion, the correct answer is “A” – Access control. SIEM is not dealing with physical controls and instead focuses on data collection and analysis, regarding a completely different layer. Defense-in-depth describes a concept of multiple layers of security controls that provides security in case of the failure of one or more layers. I can’t see this approach here. Security perimeter would describe the subset of physical access controls that are described here (e.g. physical barriers), but overall I’d say that “Access control” would be the broader definition to include all of the mentioned measurements.
upvoted 1 times
...
Fouad777
3 months, 2 weeks ago
Selected Answer: C
Defense-in-depth is a comprehensive security strategy that employs multiple layers of security controls across various levels of an organization to protect against threats. The idea is to create a layered defense, so if one security measure fails, other layers still provide protection. The components mentioned—physical barriers, card and PIN access systems, cameras, alarms, and security guards—are all elements of physical security and access control, which are part of a broader defense-in-depth strategy. These measures work together to provide redundancy, so even if one layer is bypassed, others are still in place to protect the organization.
upvoted 1 times
SangSang
2 months, 3 weeks ago
Stop using ChatGPT, use you brain please.
upvoted 1 times
...
...
Zapepelele
3 months, 2 weeks ago
Selected Answer: C
Defense-in-depth, does indeed encompass the elements described in option D, Security perimeter, along with additional layers of security measures.
upvoted 1 times
...
somsom
5 months, 2 weeks ago
C is the correct answer, A security perimeter example is a firewall,
upvoted 1 times
...
M_MUN17
5 months, 3 weeks ago
Selected Answer: C
Defense-in-depth is a security strategy that employs multiple layers of security controls to protect an organization's assets. The use of physical barriers, card and PIN access systems, cameras, alarms, and security guards exemplifies this approach, as it combines various security measures to provide a comprehensive defense against unauthorized access or threats. The other options are less accurate in this context: A. Access control focuses specifically on the policies and procedures for granting or denying access to resources. B. Security information and event management (SIEM) refers to systems that aggregate and analyze security data from various sources, which is not directly related to physical security measures. D. Security perimeter typically refers to the boundary around an organization’s physical or network environment but does not encompass the multi-layered nature of defense-in-depth.
upvoted 2 times
...
deeden
8 months ago
Selected Answer: C
I feel like C is most appropriate. A perimeter is just one layer, more like a fence. Imagine walking in to a facility with all these controls mentioned as you approach from the gate, to the parking lot, and finally the building entrance.
upvoted 2 times
...
iamlamzzy
9 months, 1 week ago
Selected Answer: C
A. Access control: This refers specifically to mechanisms that manage who or what is allowed to access resources, which would include card and PIN systems but not necessarily the broader range of physical security measures mentioned. B. Security information and event management (SIEM): This involves the collection, analysis, and reporting of security data from various sources, primarily focused on digital events rather than physical security measures. C. Defense-in-depth: This is a comprehensive strategy that integrates multiple layers of security, including both physical and logical controls. The description given fits this approach as it includes multiple layers of physical security measures. D. Security perimeter: This generally refers to the boundary that separates a secured area from a non-secured area. While it can include some of the elements mentioned, it does not fully encapsulate the range of security measures described.
upvoted 2 times
1460168
8 months, 1 week ago
D: Is boundary, correct. C: Is physical and logical (PIN Number), correct.
upvoted 1 times
...
...
CCNPWILL
10 months ago
Selected Answer: C
Def in depth. physical barrier and knowing a PIN number is already different controls.
upvoted 1 times
...
Skittle4710
10 months ago
Selected Answer: C
C. Defense-in-depth The existence of physical barriers, card and personal identification number (PIN) access systems, cameras, alarms, and security guards best describes a defense-in-depth security approach. Defense-in-depth is a layered security strategy that employs multiple, overlapping security measures to protect assets. This approach ensures that if one security measure fails, others are in place to provide continued protection. By implementing a variety of security controls across different layers (physical, technical, and administrative), organizations can better safeguard their resources against various threats.
upvoted 1 times
...
duplexjay
10 months, 1 week ago
I was tempted to go with A, but after reading the CBK Reference book, I concluded the answer is D. The key phrase is "security approach." While all those mentioned are access control methods, when applied together, it is a defense-in-depth security approach.
upvoted 1 times
...
Jenkins3mol
11 months, 1 week ago
Selected Answer: D
Don't overthink it
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago