CISSP Exam QuestionsBrowse all questions from this exam

CISSP Exam - Question 103


What documentation is produced FIRST when performing an effective physical loss control process?

Show Answer
Correct Answer: D

The first documentation produced in an effective physical loss control process is the Inventory list. Before determining the value of assets, it is essential to identify what assets exist. An inventory list provides a comprehensive catalog of all physical assets, including details such as description and location. This list serves as the foundation for subsequent steps in the physical loss control process, such as asset valuation and implementing security measures.

Discussion

17 comments
Sign in to comment
Cww1Option: D
Sep 6, 2022

I would go D, you need to inventory assets before you can value them.

jackdryan
May 11, 2023

D is correct

Dave709Option: D
Sep 8, 2022

Inventory first

oudmasterOption: C
Dec 25, 2022

I believe the key in the question here is word "effective": (effective physical loss control process). ! Asset valuation should be the answer. Because this list is not any list, but it is driven from risk analysis process.

Bach1968Option: C
Jul 5, 2023

the documentation produced FIRST when performing an effective physical loss control process is: C. Asset valuation list. The asset valuation list is an essential document in the physical loss control process. It involves assessing the value of an organization's assets, including equipment, inventory, facilities, and resources. The asset valuation helps determine the importance and worth of each asset, which in turn assists in prioritizing security measures based on their value and criticality. By creating an asset valuation list as the first step, organizations can identify high-value assets that require enhanced protection and allocate resources accordingly. This list provides a foundation for implementing appropriate physical security measures and helps guide decision-making in risk management and loss prevention strategies.

Ramye
Jun 2, 2024

Agree. This valuation is also important to gauge how much it would cost to put the necessary controls. If the cost of controls is higher than what would be protected then why spending more and just accept the risk and move on.

SongOTDOption: D
Oct 10, 2022

You need to know what you have , then the value for each item.

JamatiOption: D
Nov 9, 2022

Answer is D. This is all part of ITAM (IT Asses Management).

somkiatrOption: C
Dec 28, 2022

I choose C. The effective physical loss control process is knowing the asset value to calculate the loss expectancy (ALE = SLE x ARO and SLE = Asset Value x Exposure Factor)

Dee83Option: D
Jan 21, 2023

D. Inventory list The first step in an effective physical loss control process is to conduct an inventory of the organization's assets. This includes identifying, cataloging, and valuing all physical assets that are important to the organization. The inventory list should include a description of each asset, its location, and its value. This information is used to identify the most critical assets that need to be protected and to prioritize security measures. The inventory list serves as the foundation for the rest of the physical loss control process, providing a clear understanding of the assets that need to be protected and the potential risks that they may face.

GuardianAngelOption: D
Feb 12, 2024

Inventory list. https://www.cisa.gov/sites/default/files/publications/isc-planning-managing-physical-security-resources-dec-2015-508.pdf Section: 4 Resource Requirements

25cbb5fOption: C
Apr 3, 2024

The correct answer is C. Asset valuation list. Here's the reasoning: Physical Loss Control Process: This process aims to protect an organization's physical assets from various threats like theft, damage, or natural disasters. Importance of Asset Valuation: Before implementing any protective measures, it's crucial to understand what needs to be protected and the value of those assets. An asset valuation list provides a detailed inventory of assets along with their estimated financial worth. Why other options come later: Inventory List (D): While an inventory list is essential, it doesn't include the critical valuation component necessary to prioritize loss control measures. Security Standards List (B): Standards are developed based on understanding your assets and determining appropriate security controls. Deterrent Controls List (A): Deterrent controls are designed to discourage potential threats, a step that comes after asset valuation.

IXoneOption: C
Oct 24, 2022

Asset Identification, Valuation and Categorization of information systems assets are critical tasks of the process to properly develop and deploy the required security control for the specified IT assets. Assett Valutation include the value of an asset depends on the sensitivity of data inside the container and their potential impact on CIA, effective keyword I think it's correct C

rooticOption: D
Oct 28, 2022

Agree with D.

Delab202
Jan 1, 2023

I figured out why most of the answers on this website are wrong.

assmaalick
Jun 12, 2023

why is that?

Wz21Option: C
Nov 17, 2023

The key security management practices necessary to assess risk can be broken into six broad steps : 1. Asset identification 2. Risk assessment (Asset Valuation) 3. Policy development 4. Implementation 5. Training and education

Wz21
Nov 17, 2023

Answer is A. Inventory list (Asset Identification)

YesPleaseOption: D
Dec 10, 2023

Answer D) Inventory List This is a Chicken-or-the-Egg scenario. Asset Valuation is the first step in the process...but it can not be started without first creating an inventory list of assets and then go through the process of putting a value on it. https://www.isaca.org/resources/isaca-journal/issues/2017/volume-3/it-asset-valuation-risk-assessment-and-control-implementation-model

pete79Option: D
Feb 4, 2024

Inventory must exist in first place

e58c193Option: D
Apr 3, 2024

You can't value assets that you have no inventory of.