Exam 9: Access Control Management
Exam 1: Understanding Cybersecurity Policy and Governance20 Questions
Exam 2: Cybersecurity Policy Organization, Format, and Styles20 Questions
Exam 3: Cybersecurity Framework20 Questions
Exam 4: Governance and Risk Management20 Questions
Exam 5: Asset Management and Data Loss Prevention19 Questions
Exam 6: Human Resources Security20 Questions
Exam 7: Physical and Environmental Security19 Questions
Exam 8: Communications and Operations Security19 Questions
Exam 9: Access Control Management18 Questions
Exam 10: Information Systems Acquisition, Development, and Maintenance20 Questions
Exam 11: Cybersecurity Incident Response20 Questions
Exam 12: Business Continuity Management20 Questions
Exam 13: Regulatory Compliance for Financial Institutions20 Questions
Exam 14: Regulatory Compliance for the Health-Care Sector20 Questions
Exam 15: PCI Compliance for Merchants20 Questions
Exam 16: Nist Cybersecurity Framework20 Questions
Select questions type
Providing your mother's maiden name as verification is an example of which of the following?
Free
(Multiple Choice)
4.9/5
(45)
Correct Answer:
D
The Internet is an example of which of the following network types?
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
B
Which of the following statements best describes object capability?
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
C
Which of the following is an example of authentication by characteristic?
(Multiple Choice)
4.9/5
(31)
Which of the following refers to security features that govern how users and processes communicate and interact with systems and resources?
(Multiple Choice)
4.8/5
(41)
Which of the following statements best describes segregation of duties?
(Multiple Choice)
4.8/5
(35)
Which of the following provides access to one or more applications through a single centralized interface?
(Multiple Choice)
4.9/5
(36)
Which of the following is the most dangerous and unwanted IDS/IPS decision state?
(Multiple Choice)
4.8/5
(38)
Which of the following network types is a segment of the internal network that requires a high degree of protection?
(Multiple Choice)
4.9/5
(36)
Which of the following is an access control that is based on a specific job role or function?
(Multiple Choice)
4.7/5
(38)
Which common attribute of all access controls is used to identify unique records in a set, such as a username?
(Multiple Choice)
4.9/5
(28)
Which of the following best describes an intrusion prevention system?
(Multiple Choice)
4.7/5
(38)
Which of the following is not an example of authentication by knowledge?
(Multiple Choice)
4.8/5
(32)
Using a smartcard and a one-time passcode is an example of which of the following authentication methods?
(Multiple Choice)
4.8/5
(35)
Which of the following statements best describes an administrative account control called dual control?
(Multiple Choice)
4.9/5
(40)
Which of the following provides a secure tunnel for transmitting data through an insecure network such as the Internet?
(Multiple Choice)
4.7/5
(37)
Using a palm scan for authentication is an example of which of the following?
(Multiple Choice)
4.7/5
(33)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)