List the five top-level functions specified by the EBK for the physical security management process.

What will be an ideal response?


1. Coordinate with personnel managing IT security, personnel security, operations security, and other security functional areas to provide an integrated, holistic, and coherent security effort
2. Acquire necessary resources, including financial resources, to support an effective physical security program
3. Establish a physical security performance measurement system
4. Establish a program to determine the value of physical assets and the impact if unavailable
5. Ensure that appropriate changes and improvement actions are implemented as required

Computer Science & Information Technology

You might also like to view...

Which of the following is not possible?

a. A class that implements two interfaces. b. A class that inherits from two classes. c. A class that inherits from one class, and implements an interface. d. All of the above are possible.

Computer Science & Information Technology

What are two fixed-layout file formats and why would you use them?

What will be an ideal response?

Computer Science & Information Technology

A datacenter requires that staff be able to identify whether or not items have been removed from the facility. Which of the following controls will allow the organization to provide automated notification of item removal?

A. CCTV B. Environmental monitoring C. RFID D. EMI shielding

Computer Science & Information Technology

In the figure above, which number refers to a folder on the FTP site where the site will be published?

A. 2 B. 3 C. 4 D. 5

Computer Science & Information Technology