List three of the five items contained in design part of the EBK for physical security.

What will be an ideal response?


1. Identify the physical security program requirements and specifications in relationship to enterprise security goals
2. Develop policies and procedures for identifying and mitigating physical and environmental threats to information assets, personnel, facilities, and equipment
3. Develop a physical security and environmental security plan, including security test plans and contingency plans, in coordination with other security planning functions
4. Develop countermeasures against identified risks and vulnerabilities
5. Develop criteria for inclusion in the acquisition of facilities, equipment, and services that impact physical security

Computer Science & Information Technology

You might also like to view...

Which of the following best describes a procedure?

A) Application of a standard to a specific category or grouping B) Instructions on how a policy is carried out C) Teaching tools that help people conform to a policy D) Specifications for implementation of a policy

Computer Science & Information Technology

Produce a report detailing how many times each book title has been borrowed.

What will be an ideal response?

Computer Science & Information Technology

If the controls on a form are not grouped in a tabular or stacked layout, you can change the ________ between the controls

A) layout B) sections C) form D) spacing

Computer Science & Information Technology

Which of the following is FALSE about headers and footers in Word 2013?

A) A document cannot display both a header and footer B) When you edit header or footer text, it is automatically changed on all pages C) A document may display a header but not a footer, and vice versa D) Both a header and a footer can contain fields

Computer Science & Information Technology