A financial organization is designing physical access controls for their data center which houses critical infrastructure. The security team wants to implement a comprehensive approach to restricting unauthorized access. Which of the following combinations best demonstrates appropriate layered physical access controls for the data center?
Biometric access control for key entry points, reinforced walls, and fire suppression systems
High-security door locks, security guards at main entrance, visitor log, and alarm system
Perimeter fencing with guard patrols, access card system for building entry, biometric verification for server room access, and CCTV surveillance throughout the facility
Access cards for employees, mantrap at building entrance, security cameras at external doors, and sign-in procedures
The correct answer demonstrates a proper implementation of defense-in-depth for physical security. The combination includes perimeter security (fencing with guard patrol), building access control (access card system), additional authentication for sensitive areas (biometric verification), and monitoring (CCTV surveillance). This layered approach provides multiple security controls that must be bypassed for an attacker to gain unauthorized access to critical assets.
The incorrect options either rely too heavily on a single type of control, lack monitoring capabilities, or include inappropriate controls for a data center environment. Defense-in-depth is a fundamental security principle that applies to both physical and logical security controls, requiring multiple, varied security measures to protect assets.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the concept of defense-in-depth in security?
Open an interactive chat with Bash
Why is CCTV surveillance important in physical security?
Open an interactive chat with Bash
What are the advantages of using biometric verification for access control?
Open an interactive chat with Bash
ISC2 CISSP
Identity and Access Management (IAM)
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access