Th is system is also established for what other reasons?

All visitors entering the facility should sign in and out on a visitors log, whether a pen and paper system or a computer-based system, to maintain accountability of who is in the facility. Th is system is also established for what other reasons?

All visitors entering the facility should sign in and out on a visitors log, whether a pen and paper system or a computer-based system, to maintain accountability of who is in the facility. Th is system is also established for what other reasons?

A.
for the purpose of detection, accountability and the necessity for response

B.
access control and surveillance

C.
timeframe of the visit, who was visited, and in the case of an emergency have accountability of everyone for safety purposes

D.
for planning assessment and the requirements of proper designation

Explanation:
C: All visitors entering the facility should sign in and out on a visitors log to maintain accountability of who is in the facility, the timeframe of the visit, who they visited, and in the case of an emergency have accountability of everyone for safety purposes. Page 646.



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Peter

Peter

Why A is not the answer?

Matt

Matt

@Peter: I suppose a visitor log is not a detective control?

Rolex

Rolex

It seems A is the correct answer. It is a detective control

Access logs are a detective control, meaning they serve to record events such as the … The log should contain identifying information and the nature of their visit.

CISSP Guide to Security Essentials – 301 page
https://books.google.com.hk/books?isbn=130584047X