Not C. Regular sweeps of the perimeter, including manual inspection of cable ingress points -- useful as a supplemental control, but it’s not continuous and won’t detect real-time tampering.
Fencing around the facility and survilence with CCTV can not monitor the secuirty of burried line. CCTV can only let us know that who is entring and exiting the facility. It can be legitimate workers as well. But how to monitor if burried lines are being tempered ? only way to get it monitored is by using ground sensors.
If you could go with ONLY ONE option in real life, wouldn't it be A (i.e. fence + CCTV)? These questions asking for MOST x or y, I typically think ONLY ONE option and leave the rest.
there are different sensor types that can indeed report back to a centralized monitoring station. Definitely going with B. makes the most sense.
A and B are addressing the perimeter... D is not better than B.
B is correct.
All three other answers are perimeter security. The only option that is not is B. Ground Sensors.
A. Perimeter security: Installing fences, gates, surveillance cameras, and access control systems to secure the external area around the cable ingress point and the entire data center facility.
D. Perimeter Cable management: Implementing proper cable management practices, including secure enclosures, cable trays and conduits
C. Perimeter Regular inspections and maintenance: Conducting regular inspections and maintenance of the cable ingress point and the surrounding areas to identify and address any potential security vulnerabilities promptly.
I believe it is C, this is more tricky question rather than effective control.
"inside the perimeter of a facility" and "most effective", assuming that inside the facility perimeter you already have enough access controls etc... a regular sweeps of the perimeter should be more than enough.
The MOST effective control to monitor the security of buried data lines inside the perimeter of a facility is B. Ground sensors installed and reporting to a security event management (SEM) system.
Ground sensors are devices that can detect vibrations or other disturbances in the ground. When a ground sensor is triggered, it sends an alert to a security event management (SEM) system. The SEM system can then notify security personnel of the alert, so they can investigate the situation.
There is literally 2 pages dedicated to CCTV cameras in the Official Study Guide. PG 460 includes "Video surveillance, video monitoring, closed-circuit television (CCTV), and security cameras are all means to deter unwanted activity and create a digital record of the occurrence of events. Cameras should be positioned to watch exit and entry points allowing any change in authorization or access level. Cameras should also be used to monitor activities around valuable assets and resources as well as to provide additional protection in public areas such as parking structures and walkways."
B.is the likely answer
Ground sensors installed and reporting to a security event management (SEM) system is the most effective control to monitor the security of buried data lines inside the perimeter of a facility. Ground sensors can detect any unauthorized digging or excavation near the buried data lines, and by reporting to a security event management system, the security team will be alerted immediately to any potential threats. CCTV cameras and regular perimeter sweeps can help to detect and deter intruders, but they may not detect digging or excavation near the buried data lines. Steel casing around the facility ingress points can provide a level of physical protection, but it may not detect or deter unauthorized access to the buried data lines.
I agreed with C. Ground sensor is detective control and may generate false positive alert while sweeping the perimeter regularly and inspecting all the cable's ingress points manually would be more preventive and most effective comparing to other choices.
That's why you need sensors to trigger an alert and report to a SEM where buried cables are laid. Having worked for a cable company and Dish Network, I know for sure that you don't start digging without an authorized team that has the ability to scan the ground for buried pipes and cables. That could be automated via sensors that alert a SEM in a data center environment.
upvoted 1 times
...
...
...
...
This section is not available anymore. Please use the main Exam Page.CISSP Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
FredDurst
Highly Voted 1 year, 11 months agoJamati
1 year, 11 months agooudmaster
1 year, 9 months agodm808
6 months, 3 weeks agoRedMartian
Most Recent 1 week, 6 days agoamitsir
3 weeks, 3 days agoSH_
4 weeks agoBau24
2 months, 1 week agoCCNPWILL
6 months agoGuardianAngel
8 months, 1 week agomaawar83
9 months, 3 weeks agoSoleandheel
10 months, 2 weeks agoDemo25
1 year, 3 months agoJung1999
1 year, 6 months agojackdryan
1 year, 5 months agoRVoigt
1 year, 7 months agoJohnyDal
1 year, 8 months agoDee83
1 year, 9 months agosomkiatr
1 year, 9 months agohalonsx
1 year, 10 months agostickerbush1970
2 years, 1 month agorootic
1 year, 11 months agoDelab202
1 year, 9 months agoSledge_Hammer
1 year, 1 month ago