Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 103 discussion

Actual exam question from ISC's CISSP
Question #: 103
Topic #: 1
[All CISSP Questions]

What documentation is produced FIRST when performing an effective physical loss control process?

  • A. Deterrent controls list
  • B. Security standards list
  • C. Asset valuation list
  • D. Inventory list
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Cww1
Highly Voted 2 years, 2 months ago
I would go D, you need to inventory assets before you can value them.
upvoted 13 times
jackdryan
1 year, 6 months ago
D is correct
upvoted 1 times
...
...
Dave709
Highly Voted 2 years, 2 months ago
Selected Answer: D
Inventory first
upvoted 10 times
...
25cbb5f
Most Recent 7 months, 3 weeks ago
Selected Answer: C
The correct answer is C. Asset valuation list. Here's the reasoning: Physical Loss Control Process: This process aims to protect an organization's physical assets from various threats like theft, damage, or natural disasters. Importance of Asset Valuation: Before implementing any protective measures, it's crucial to understand what needs to be protected and the value of those assets. An asset valuation list provides a detailed inventory of assets along with their estimated financial worth. Why other options come later: Inventory List (D): While an inventory list is essential, it doesn't include the critical valuation component necessary to prioritize loss control measures. Security Standards List (B): Standards are developed based on understanding your assets and determining appropriate security controls. Deterrent Controls List (A): Deterrent controls are designed to discourage potential threats, a step that comes after asset valuation.
upvoted 2 times
...
e58c193
7 months, 3 weeks ago
Selected Answer: D
You can't value assets that you have no inventory of.
upvoted 1 times
...
GuardianAngel
9 months, 2 weeks ago
Selected Answer: D
Inventory list. https://www.cisa.gov/sites/default/files/publications/isc-planning-managing-physical-security-resources-dec-2015-508.pdf Section: 4 Resource Requirements
upvoted 2 times
...
pete79
9 months, 3 weeks ago
Selected Answer: D
Inventory must exist in first place
upvoted 1 times
...
YesPlease
11 months, 2 weeks ago
Selected Answer: D
Answer D) Inventory List This is a Chicken-or-the-Egg scenario. Asset Valuation is the first step in the process...but it can not be started without first creating an inventory list of assets and then go through the process of putting a value on it. https://www.isaca.org/resources/isaca-journal/issues/2017/volume-3/it-asset-valuation-risk-assessment-and-control-implementation-model
upvoted 1 times
...
Wz21
1 year ago
The key security management practices necessary to assess risk can be broken into six broad steps : 1. Asset identification 2. Risk assessment (Asset Valuation) 3. Policy development 4. Implementation 5. Training and education
upvoted 1 times
Wz21
1 year ago
Answer is A. Inventory list (Asset Identification)
upvoted 1 times
...
...
Bach1968
1 year, 4 months ago
Selected Answer: C
the documentation produced FIRST when performing an effective physical loss control process is: C. Asset valuation list. The asset valuation list is an essential document in the physical loss control process. It involves assessing the value of an organization's assets, including equipment, inventory, facilities, and resources. The asset valuation helps determine the importance and worth of each asset, which in turn assists in prioritizing security measures based on their value and criticality. By creating an asset valuation list as the first step, organizations can identify high-value assets that require enhanced protection and allocate resources accordingly. This list provides a foundation for implementing appropriate physical security measures and helps guide decision-making in risk management and loss prevention strategies.
upvoted 4 times
Ramye
5 months, 3 weeks ago
Agree. This valuation is also important to gauge how much it would cost to put the necessary controls. If the cost of controls is higher than what would be protected then why spending more and just accept the risk and move on.
upvoted 1 times
...
...
Dee83
1 year, 10 months ago
D. Inventory list The first step in an effective physical loss control process is to conduct an inventory of the organization's assets. This includes identifying, cataloging, and valuing all physical assets that are important to the organization. The inventory list should include a description of each asset, its location, and its value. This information is used to identify the most critical assets that need to be protected and to prioritize security measures. The inventory list serves as the foundation for the rest of the physical loss control process, providing a clear understanding of the assets that need to be protected and the potential risks that they may face.
upvoted 2 times
...
Delab202
1 year, 10 months ago
I figured out why most of the answers on this website are wrong.
upvoted 1 times
assmaalick
1 year, 5 months ago
why is that?
upvoted 1 times
...
...
somkiatr
1 year, 11 months ago
Selected Answer: C
I choose C. The effective physical loss control process is knowing the asset value to calculate the loss expectancy (ALE = SLE x ARO and SLE = Asset Value x Exposure Factor)
upvoted 2 times
...
oudmaster
1 year, 11 months ago
I believe the key in the question here is word "effective": (effective physical loss control process). ! Asset valuation should be the answer. Because this list is not any list, but it is driven from risk analysis process.
upvoted 5 times
...
Jamati
2 years ago
Selected Answer: D
Answer is D. This is all part of ITAM (IT Asses Management).
upvoted 2 times
...
rootic
2 years ago
Selected Answer: D
Agree with D.
upvoted 1 times
...
IXone
2 years, 1 month ago
Asset Identification, Valuation and Categorization of information systems assets are critical tasks of the process to properly develop and deploy the required security control for the specified IT assets. Assett Valutation include the value of an asset depends on the sensitivity of data inside the container and their potential impact on CIA, effective keyword I think it's correct C
upvoted 1 times
...
SongOTD
2 years, 1 month ago
Selected Answer: D
You need to know what you have , then the value for each item.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...