nerdexam
(ISC)2(ISC)2

CISSP · Question #1447

CISSP Question #1447: Real Exam Question with Answer & Explanation

The correct answer is B: Ground sensors installed and reporting to a security event management (SEM) system. The most effective control to monitor the security of buried data lines inside the perimeter of a facility is to use ground sensors installed and reporting to a security event management (SEM) system. Ground sensors are devices that detect and measure the physical changes or dist

Submitted by carter_n· Mar 5, 2026Asset Security

Question

To monitor the security of buried data lines inside the perimeter of a facility, which of the following is the MOST effective control?

Options

  • AFencing around the facility with closed-circuit television (CCTV) cameras at all entry points
  • BGround sensors installed and reporting to a security event management (SEM) system
  • CSteel casing around the facility ingress points
  • Dregular sweeps of the perimeter, including manual inspection of the cable ingress points

Explanation

The most effective control to monitor the security of buried data lines inside the perimeter of a facility is to use ground sensors installed and reporting to a security event management (SEM) system. Ground sensors are devices that detect and measure the physical changes or disturbances in the ground, such as vibration, pressure, or sound, caused by any movement or activity near the buried data lines. Ground sensors can report the detected signals to a security event management system, which is a system that collects, analyzes, and correlates the security events and alerts from various sources, such as sensors, cameras, or logs. A security event management system can help to identify and respond to any unauthorized or malicious attempts to access, tamper, or damage the buried data lines, and to alert the security personnel or

Topics

#Physical security#Perimeter security#Ground sensors#Security monitoring

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions