ISC SSCP Exam Questions
SSCP System Security Certified Practitioner (SSCP) (Page 12 )

Updated On: 27-Feb-2026

Which of the following is not a physical control for physical security?

  1. lighting
  2. fences
  3. training
  4. facility construction materials

Answer(s): C

Explanation:

Some physical controls include fences, lights, locks, and facility construction materials. Some administrative controls include facility selection and construction, facility management, personnel controls, training, and emergency response and procedures.
From: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 3rd.
Ed., Chapter 6, page 403.



Crime Prevention Through Environmental Design (CPTED) is a discipline that:

  1. Outlines how the proper design of a physical environment can reduce crime by directly affecting human behavior.
  2. Outlines how the proper design of the logical environment can reduce crime by directly affecting human behavior.
  3. Outlines how the proper design of the detective control environment can reduce crime by directly affecting human behavior.
  4. Outlines how the proper design of the administrative control environment can reduce crime by directly affecting human behavior.

Answer(s): A

Explanation:

Crime Prevention Through Environmental Design (CPTED) is a discipline that outlines how the proper design of a physical environment can reduce crime by directly affecting human behavior. It provides guidance about lost and crime prevention through proper facility contruction and environmental components and procedures.
CPTED concepts were developed in the 1960s. They have been expanded upon and have matured as our environments and crime types have evolved. CPTED has been used not just to develop corporate physical security programs, but also for large-scale activities such as development of neighborhoods, towns, and cities. It addresses landscaping, entrances, facility and neighborhood layouts, lighting, road placement, and traffic circulation patterns. It looks at microenvironments, such as offices and rest-rooms, and macroenvironments, like campuses and cities.


Reference:

Harris, Shon (2012-10-18). CISSP All-in-One Exam Guide, 6th Edition (p. 435). McGraw-Hill.
Kindle Edition.
and
CPTED Guide Book



The following is NOT a security characteristic we need to consider while choosing a biometric identification systems:

  1. data acquisition process
  2. cost
  3. enrollment process
  4. speed and user interface

Answer(s): B

Explanation:

Cost is a factor when considering Biometrics but it is not a security characteristic.
All the other answers are incorrect because they are security characteristics related to Biometrics.
data acquisition process can cause a security concern because if the process is not fast and efficient it can discourage individuals from using the process.
enrollment process can cause a security concern because the enrollment process has to be quick
and efficient. This process captures data for authentication.
speed and user interface can cause a security concern because this also impacts the users acceptance rate of biometrics. If they are not comfortable with the interface and speed they might sabotage the devices or otherwise attempt to circumvent them.


Reference:

OIG Access Control (Biometrics) (pgs 165-167)
From: TIPTON, Harold F. & KRAUSE, MICKI, Information Security Management Handbook, 4th Edition, Volume 1, Pages 5-6.
in process of correction



In biometric identification systems, at the beginning, it was soon apparent that truly positive identification could only be based on :

  1. sex of a person
  2. physical attributes of a person
  3. age of a person
  4. voice of a person

Answer(s): B

Explanation:

Today implementation of fast, accurate reliable and user-acceptable biometric identification systems is already under way.
From: TIPTON, Harold F. & KRAUSE, MICKI, Information Security Management Handbook, 4th Edition, Volume 1, Page 7.



In biometric identification systems, at the beginning, it was soon apparent that truly positive identification could only be based on physical attributes of a person. This raised the necessity of answering 2 questions :

  1. what was the sex of a person and his age
  2. what part of body to be used and how to accomplish identification that is viable
  3. what was the age of a person and his income level
  4. what was the tone of the voice of a person and his habits

Answer(s): B

Explanation:

Today implementation of fast, accurate reliable and user-acceptable biometric identification systems is already taking place. Unique physical attributes or behavior of a person are used for that purpose.
From: TIPTON, Harold F. & KRAUSE, MICKI, Information Security Management Handbook, 4th Edition, Volume 1, Page 7.






Post your Comments and Discuss ISC SSCP exam dumps with other Community members:

Join the SSCP Discussion