{"id":93332,"date":"2025-06-01T11:48:36","date_gmt":"2025-06-01T11:48:36","guid":{"rendered":"https:\/\/exam.pscnotes.com\/mcq\/?p=93332"},"modified":"2025-06-01T11:48:36","modified_gmt":"2025-06-01T11:48:36","slug":"which-of-the-following-are-the-three-ds-in-the-principles-of-securit","status":"publish","type":"post","link":"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-are-the-three-ds-in-the-principles-of-securit\/","title":{"rendered":"Which of the following are the three \u2018D\u2019s in the Principles of Securit"},"content":{"rendered":"<p>Which of the following are the three \u2018D\u2019s in the Principles of Security ?<\/p>\n<ul>\n<li>1. Denial<\/li>\n<li>2. Detection<\/li>\n<li>3. Deterrence<\/li>\n<li>4. Destruction<\/li>\n<\/ul>\n<p>Select the correct answer using the code given below :<\/p>\n<p>[amp_mcq option1=&#8221;1, 2 and 4&#8243; option2=&#8221;2, 3 and 4&#8243; option3=&#8221;1, 2 and 3&#8243; option4=&#8221;1, 3 and 4&#8243; correct=&#8221;option3&#8243;]<\/p>\n<div class=\"psc-box-pyq-exam-year-detail\">\n<div class=\"pyq-exam\">\n<div class=\"psc-heading\">This question was previously asked in<\/div>\n<div class=\"psc-title line-ellipsis\">UPSC CISF-AC-EXE &#8211; 2023<\/div>\n<\/div>\n<div class=\"pyq-exam-psc-buttons\"><a href=\"\/pyq\/pyq-upsc-cisf-ac-exe-2023.pdf\" target=\"_blank\" class=\"psc-pdf-button\" rel=\"noopener\">Download PDF<\/a><a href=\"\/pyq-upsc-cisf-ac-exe-2023\" target=\"_blank\" class=\"psc-attempt-button\" rel=\"noopener\">Attempt Online<\/a><\/div>\n<\/div>\n<section id=\"pyq-correct-answer\">\nIn the principles of security, particularly physical or information security, the three common &#8216;D&#8217;s are Denial, Detection, and Deterrence.<br \/>\n<\/section>\n<section id=\"pyq-key-points\">\n&#8211; **Denial:** Measures taken to prevent unauthorized access or actions (e.g., locks, firewalls).<br \/>\n&#8211; **Detection:** Measures to identify that an unauthorized action or event has occurred or is occurring (e.g., alarms, surveillance systems).<br \/>\n&#8211; **Deterrence:** Measures aimed at discouraging potential adversaries from attempting an unauthorized action (e.g., visible security presence, warnings).<br \/>\n&#8211; Destruction (4) is a consequence of an event or an active measure against a threat, not typically considered a core principle of security *design* or *planning* in the same category as Denial, Detection, and Deterrence, which focus on preventing, identifying, or discouraging security breaches.<br \/>\n<\/section>\n<section id=\"pyq-additional-information\">\nThese principles form a layered approach to security. Ideally, denial measures should prevent incidents. If denial fails, detection measures alert to the breach. Deterrence aims to prevent attempts in the first place by increasing the perceived risk or difficulty for an attacker.<br \/>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Which of the following are the three \u2018D\u2019s in the Principles of Security ? 1. Denial 2. Detection 3. Deterrence 4. Destruction Select the correct answer using the code given below : [amp_mcq option1=&#8221;1, 2 and 4&#8243; option2=&#8221;2, 3 and 4&#8243; option3=&#8221;1, 2 and 3&#8243; option4=&#8221;1, 3 and 4&#8243; correct=&#8221;option3&#8243;] This question was previously asked &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Which of the following are the three \u2018D\u2019s in the Principles of Securit\" class=\"read-more button\" href=\"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-are-the-three-ds-in-the-principles-of-securit\/#more-93332\">Detailed Solution<span class=\"screen-reader-text\">Which of the following are the three \u2018D\u2019s in the Principles of Securit<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1089],"tags":[1105,1099,1115],"class_list":["post-93332","post","type-post","status-publish","format-standard","hentry","category-upsc-cisf-ac-exe","tag-1105","tag-indian-polity-and-governance","tag-miscellaneous","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v23.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Which of the following are the three \u2018D\u2019s in the Principles of Securit<\/title>\n<meta name=\"description\" content=\"In the principles of security, particularly physical or information security, the three common &#039;D&#039;s are Denial, Detection, and Deterrence. - **Denial:** Measures taken to prevent unauthorized access or actions (e.g., locks, firewalls). - **Detection:** Measures to identify that an unauthorized action or event has occurred or is occurring (e.g., alarms, surveillance systems). - **Deterrence:** Measures aimed at discouraging potential adversaries from attempting an unauthorized action (e.g., visible security presence, warnings). - Destruction (4) is a consequence of an event or an active measure against a threat, not typically considered a core principle of security *design* or *planning* in the same category as Denial, Detection, and Deterrence, which focus on preventing, identifying, or discouraging security breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-are-the-three-ds-in-the-principles-of-securit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Which of the following are the three \u2018D\u2019s in the Principles of Securit\" \/>\n<meta property=\"og:description\" content=\"In the principles of security, particularly physical or information security, the three common &#039;D&#039;s are Denial, Detection, and Deterrence. - **Denial:** Measures taken to prevent unauthorized access or actions (e.g., locks, firewalls). - **Detection:** Measures to identify that an unauthorized action or event has occurred or is occurring (e.g., alarms, surveillance systems). - **Deterrence:** Measures aimed at discouraging potential adversaries from attempting an unauthorized action (e.g., visible security presence, warnings). - Destruction (4) is a consequence of an event or an active measure against a threat, not typically considered a core principle of security *design* or *planning* in the same category as Denial, Detection, and Deterrence, which focus on preventing, identifying, or discouraging security breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-are-the-three-ds-in-the-principles-of-securit\/\" \/>\n<meta property=\"og:site_name\" content=\"MCQ and Quiz for Exams\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-01T11:48:36+00:00\" \/>\n<meta name=\"author\" content=\"rawan239\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rawan239\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Which of the following are the three \u2018D\u2019s in the Principles of Securit","description":"In the principles of security, particularly physical or information security, the three common 'D's are Denial, Detection, and Deterrence. - **Denial:** Measures taken to prevent unauthorized access or actions (e.g., locks, firewalls). - **Detection:** Measures to identify that an unauthorized action or event has occurred or is occurring (e.g., alarms, surveillance systems). - **Deterrence:** Measures aimed at discouraging potential adversaries from attempting an unauthorized action (e.g., visible security presence, warnings). - Destruction (4) is a consequence of an event or an active measure against a threat, not typically considered a core principle of security *design* or *planning* in the same category as Denial, Detection, and Deterrence, which focus on preventing, identifying, or discouraging security breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-are-the-three-ds-in-the-principles-of-securit\/","og_locale":"en_US","og_type":"article","og_title":"Which of the following are the three \u2018D\u2019s in the Principles of Securit","og_description":"In the principles of security, particularly physical or information security, the three common 'D's are Denial, Detection, and Deterrence. - **Denial:** Measures taken to prevent unauthorized access or actions (e.g., locks, firewalls). - **Detection:** Measures to identify that an unauthorized action or event has occurred or is occurring (e.g., alarms, surveillance systems). - **Deterrence:** Measures aimed at discouraging potential adversaries from attempting an unauthorized action (e.g., visible security presence, warnings). - Destruction (4) is a consequence of an event or an active measure against a threat, not typically considered a core principle of security *design* or *planning* in the same category as Denial, Detection, and Deterrence, which focus on preventing, identifying, or discouraging security breaches.","og_url":"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-are-the-three-ds-in-the-principles-of-securit\/","og_site_name":"MCQ and Quiz for Exams","article_published_time":"2025-06-01T11:48:36+00:00","author":"rawan239","twitter_card":"summary_large_image","twitter_misc":{"Written by":"rawan239","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-are-the-three-ds-in-the-principles-of-securit\/","url":"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-are-the-three-ds-in-the-principles-of-securit\/","name":"Which of the following are the three \u2018D\u2019s in the Principles of Securit","isPartOf":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#website"},"datePublished":"2025-06-01T11:48:36+00:00","dateModified":"2025-06-01T11:48:36+00:00","author":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209"},"description":"In the principles of security, particularly physical or information security, the three common 'D's are Denial, Detection, and Deterrence. - **Denial:** Measures taken to prevent unauthorized access or actions (e.g., locks, firewalls). - **Detection:** Measures to identify that an unauthorized action or event has occurred or is occurring (e.g., alarms, surveillance systems). - **Deterrence:** Measures aimed at discouraging potential adversaries from attempting an unauthorized action (e.g., visible security presence, warnings). - Destruction (4) is a consequence of an event or an active measure against a threat, not typically considered a core principle of security *design* or *planning* in the same category as Denial, Detection, and Deterrence, which focus on preventing, identifying, or discouraging security breaches.","breadcrumb":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-are-the-three-ds-in-the-principles-of-securit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-are-the-three-ds-in-the-principles-of-securit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-are-the-three-ds-in-the-principles-of-securit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exam.pscnotes.com\/mcq\/"},{"@type":"ListItem","position":2,"name":"UPSC CISF-AC-EXE","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/upsc-cisf-ac-exe\/"},{"@type":"ListItem","position":3,"name":"Which of the following are the three \u2018D\u2019s in the Principles of Securit"}]},{"@type":"WebSite","@id":"https:\/\/exam.pscnotes.com\/mcq\/#website","url":"https:\/\/exam.pscnotes.com\/mcq\/","name":"MCQ and Quiz for Exams","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exam.pscnotes.com\/mcq\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209","name":"rawan239","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","caption":"rawan239"},"sameAs":["https:\/\/exam.pscnotes.com"],"url":"https:\/\/exam.pscnotes.com\/mcq\/author\/rawan239\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/93332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/comments?post=93332"}],"version-history":[{"count":0,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/93332\/revisions"}],"wp:attachment":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/media?parent=93332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/categories?post=93332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/tags?post=93332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}