Change set

Pick exam & year, then Go.

Question map
Not attempted Correct Incorrect ★ Bookmarked
Loading…
Q108 (CISF/2026) Science & Technology › ICT, AI, Cybersecurity & Emerging Tech

Integrated Security System includes : 1. Combined Security Equipment with computers and common communication medium 2. Human Resource Data Acquisition and Management 3. Fire and Life safety 4. Information transfer and information accessibility over Local and Wide Area Networks Select the answer using the code given below :

Result
Your answer: —  Â·  Correct: D

Explanation

An Integrated Security System (ISS) is a multi-layered framework that combines various security subsystems into a single, cohesive network to enhance situational awareness and response efficiency. The components mentioned are all integral to a modern ISS:

  • Statement 1: ISS utilizes computers and common communication protocols to link hardware like CCTV, sensors, and alarms into a unified interface.
  • Statement 2: It includes Access Control Systems (ACS) and Visitor Management, which handle human resource data acquisition (biometrics, ID logs) to manage entry and exit.
  • Statement 3: Modern integration includes Fire and Life Safety systems (smoke detectors, sprinklers) to ensure coordinated emergency responses (e.g., unlocking doors automatically during a fire).
  • Statement 4: Information is transferred over LAN and WAN, allowing for remote monitoring, centralized data storage, and real-time accessibility across different locations.

This holistic approach ensures that individual security elements do not operate in silos, providing a more robust defense mechanism.

How others answered
Each bar shows the % of students who chose that option. Green bar = correct answer, blue outline = your choice.
Community Performance
Out of everyone who attempted this question.
60%
got it right
✓ Thank you! We'll review this.

SIMILAR QUESTIONS

CAPF · 2025 · Q81 Relevance score: -8.05

Which of the following are components of Geographic Information System (GIS)? 1. Data 2. Hardware 3. Software 4. People Select the answer using the code given below.

CDS-II · 2010 · Q20 Relevance score: -8.09

Cloud computing refers to

NDA-II · 2013 · Q21 Relevance score: -8.28

Consider the following statements about the National Cyber Security Policy, approved by the Union Cabinet in may 2013: 1. The policy focuses on manpower training 2. It aims to create a secured computing environment across the country Which of the statements given above is/are correct?

IAS · 2015 · Q32 Relevance score: -8.39

With reference to 'Near Field Communication (NFC) Technology', which of the following statements is/are correct? 1. It is a contactless communication technology that uses electromagnetic radio fields. 2. NFC is designed for use by devices which can be at a distance of even a metre from each other. 3. NFC can use encryption when sending sensitive information. Select the correct answer using the code given below.

CAPF · 2025 · Q118 Relevance score: -8.43

What is the correct term used for a set of wires used to connect different internal components of the computer system for the purpose of transferring data as well as addresses amongst them?