Which of the following devices does Cisco classify as t…

Which of the following devices does Cisco classify as threat detection devices? (Choose three.)

Which of the following devices does Cisco classify as threat detection devices? (Choose three.)

A.
analog and IP cameras

B.
Cisco Access Control

C.
Cisco IPICS

D.
Cisco Video Surveillance

E.
digital signage

F.
radios, mobile phones, and IP phones

G.
third-party sensors

Explanation:
Cisco classifies the following devices as threat detection devices:
Analog and IP cameras
Third-party sensors
Cisco Access Control
Threat detection involves capturing video or audio-based activity at access points, such as doors or windows.
Activity made by users with badges can also be captured and recorded. Cisco IP cameras and third-party
analog and IP cameras can record activity at access doors or in secure areas. Third-party sensors can capture
heat signatures, record badge information, or scan fingerprints. Cisco Access Control can manage door locks
and access control readers for several thousand doors over a network.
Threat monitoring involves the observation and storage of real-time and captured information. Cisco classifies
the following devices as threat monitoring devices:
Cisco IP Interoperability and Collaboration System (IPICS)
Cisco Video Surveillance
Cisco IPICS is a dispatch and incident response solution that sends radio traffic over an IP network, enabling
incompatible radio transmission devices to communicate. Cisco Video Surveillance is a centralized video
management platform that receives live video feeds and records them for future consumption.
Threat response involves the notification of appropriate personnel after a threat has been discovered. Cisco
classifies the following devices as threat response devices:
Desktop computers
Digital signage
Radios, mobile phones, and IP phones
These devices can be used to alert users and administrators when a physical security breach has occurred so
that appropriate action can be taken.

Cisco: Cisco Physical Security Solution Overview (PDF)



Leave a Reply 0

Your email address will not be published. Required fields are marked *