CISSP Domain 7 Questions

WEEK 6 ESSAY QUESTIONS

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Instructions: Answer all questions in a single document. Then submit to the
appropriate assignment folder. Each response to a single essay question should
be about a half-page in length (about 150 words).

1. Providing physical security to a facility involves numerous methods
designed to discourage a determined attacker. Perimeter fencing, gates,
bollards, lighting, CCTV, as well as roaming security patrols and dogs are all
designed to prevent easy access to the facility. In the event that these
physical security controls are breached, perimeter monitoring and
detecting devices can provide notification of further attempts to gain
access to the facility. Describe three perimeter intrusion detection systems
and give an example of one that you have seen deployed either at work or
another location that you are familiar with.

2. Many organizations value their information so highly that they invest in a
redundant site in the event that a catastrophic event interrupted service
operations in their primary site. Different options are available for facility
recovery at varying costs and states of readiness. Describe the differences
between the hot, warm, and cold site methods of facility recovery. What is
a rolling hot site? What is a reciprocal agreement?

3. There are many different categories of evidence and each type varies in its
value in supporting an investigation. What are the four characteristics that
help ensure that evidence is legally admissible in court? Describe hearsay
evidence and its admissibility.