nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #370

CERTIFIED-IN-CYBERSECURITY Question #370: Real Exam Question with Answer & Explanation

The correct answer is C: To prevent unauthorized access to facilities and protect sensitive information and resources. Physical access controls (see ISC2 Study Guide, Chapter 2, Module 2) are designed to limit access to an organization's premises and specific areas within, helping to safeguard sensitive data, critical systems, and valuable assets from unauthorized access or tampering. The remaini

Access Controls Concepts

Question

Which of the following is a primary objective of implementing physical access controls in an organization?

Options

  • ATo avoid the need for technical security controls
  • BTo ensure all employees have unrestricted access to all areas
  • CTo prevent unauthorized access to facilities and protect sensitive information and resources
  • DTo allow public access to sensitive areas for increased transparency

Explanation

Physical access controls (see ISC2 Study Guide, Chapter 2, Module 2) are designed to limit access to an organization's premises and specific areas within, helping to safeguard sensitive data, critical systems, and valuable assets from unauthorized access or tampering. The remaining options are not primary objectives of physical access controls. Ensuring all employees have unrestricted access to all areas is not a primary objective of physical access controls, as they are designed to limit access to specific areas. Allowing public access to sensitive areas for increased transparency is not a primary objective of physical access controls, as they are designed to limit access to authorized personnel only. Avoiding the need for technical security controls is not a primary objective of physical access controls, as they are designed to supplement technical security controls.

Topics

#Physical Security#Access Control#Security Objectives#Unauthorized Access Prevention

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions