New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSAP Exam - Topic 3 Question 4 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 4
Topic #: 3
[All ISSAP Questions]

You are the Security Consultant advising a company on security methods. This is a highly secure location that deals with sensitive national defense related data. They are very concerned about physical security as they had a breach last month. In that breach an individual had simply grabbed a laptop and ran out of the building. Which one of the following would have been most effective in preventing this?

Show Suggested Answer Hide Answer
Suggested Answer: C

Thus a person exiting the building would have to go through one door, close it, go to the other end of the corridor and open that door. The

second door could not open until the first was closed. And in an emergency both doors can be automatically sealed.

Answer option A is incorrect. Laptops can be quite useful and effective. It is almost never the proper course of action to simply ban useful

technology, rather than find good ways to secure it.

Answer option B is incorrect. While this might work, it would be very expensive and would also cause a tremendous inconvenience for

employees. Furthermore, there is always the possibility of a guard leaving for a moment.

Answer option D is incorrect. Sign in logs are always a good idea. However, they would do nothing to prevent this scenario.


Contribute your Thoughts:

0/2000 characters
Emmett
4 months ago
A sign in log? Really? That won't stop a thief!
upvoted 0 times
...
Leota
4 months ago
Totally agree, locked doors with a guard is a must!
upvoted 0 times
...
Hannah
4 months ago
Not using laptops? That's a bit extreme, right?
upvoted 0 times
...
Danica
4 months ago
A man-trap would definitely help, but it's expensive.
upvoted 0 times
...
Lai
5 months ago
Keeping all doors locked with a guard seems like the best option.
upvoted 0 times
...
Lettie
5 months ago
Not using laptops seems extreme, but I guess it could eliminate the risk entirely. Still, that’s not very practical for most operations.
upvoted 0 times
...
Ciara
5 months ago
I feel like a sign-in log is too passive for a high-security area. It might not stop someone from just grabbing a laptop and running.
upvoted 0 times
...
Janey
5 months ago
I think keeping all doors locked with a guard could be effective, but what if the guard is distracted?
upvoted 0 times
...
Merlyn
5 months ago
I remember discussing the importance of physical barriers in class, but I'm not sure if a man-trap is the best option here.
upvoted 0 times
...
Ettie
5 months ago
Custom permissions, got it. I'll apply what I've learned about best practices for labeling them.
upvoted 0 times
...
Zona
5 months ago
Okay, let's think this through step-by-step. The requirements call for a robust infrastructure that can handle large user loads, improve IT efficiency, guarantee minimal downtime, and protect the network. I believe option D best meets those needs with the clustered pools and GFS2 heartbeat storage.
upvoted 0 times
...
Lonna
5 months ago
I feel pretty confident about this one. The valid approaches are A, D, and E. Running the Auto Allocate process, executing Online from the Release Sales Order window, and running a concurrent program from the Release Sales Order window are all valid ways to perform the Pick Release process.
upvoted 0 times
...
Armanda
5 months ago
This one seems straightforward - the process of converting present value to future value is called discounting, so I'll go with option D.
upvoted 0 times
...

Save Cancel