Which of the following is the basis for all effective security activity?
A.
The security plan or program is based on the use of proprietary guard services to assure proper staffing.
B.
A complete and thorough security manual has been developed.
C.
The security program must have sufficient funding.
D.
The security plan or program is based on an understanding of the risks it is designed to control.
The Answer Is:
D
This question includes an explanation.
Explanation:
The foundation of all effective security activity is an understanding of the risks the program is designed to control. This risk-based approach ensures that resources are allocated effectively, addressing the most critical vulnerabilities.
Risk Assessment:
Identifies assets, threats, vulnerabilities, and the potential impact of risks.
Tailored Controls:
Security measures are implemented to address identified risks specifically.
Continuous Monitoring:
Risks are dynamic; regular reassessment ensures the program remains effective.
A: Staffing is important but secondary to understanding risks.
B: A security manual is a tool, not the basis for activity.
C: Funding is critical but must be applied effectively based on a risk analysis.
Key Elements of Risk-Based Security Programs:Why Other Options Are Incorrect:ASIS CPP® References:
Domain 1: Security Principles and PracticesHighlights the importance of risk assessments in security planning.
ASIS-CPP PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 60% Discount on All Products,
Use Coupon: "8w52ceb345"