List three of the six general requirements for the role of physical security professional.

What will be an ideal response?

1. Design and implement enterprise continuity
2. Implement incident management
3. Evaluate personnel security
4. Manage, design, implement, and evaluate physical and environmental security
5. Evaluate procurement
6. Implement risk management

Computer Science & Information Technology

You might also like to view...

When should a program explicitly use the this reference?

a) accessing a private variable b) accessing a public variable c) accessing a local variable d) accessing a field that is shadowed by a local variable

Computer Science & Information Technology

If a program attempts to process invalid data, unexpected errors can occur.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology