Exam 2: Access Control
Exam 1: The Cissp Exam10 Questions
Exam 2: Access Control20 Questions
Exam 3: Telecommunications and Network Security19 Questions
Exam 4: Information Security Governance and Risk Management20 Questions
Exam 5: Software Development Security20 Questions
Exam 6: Cryptography20 Questions
Exam 7: Security Architecture and Design20 Questions
Exam 8: Operations Security19 Questions
Exam 9: Business Continuity and Disaster Recovery20 Questions
Exam 10: Legal, Regulations, Investigations, and Compliance20 Questions
Exam 11: Physical Environmental Security20 Questions
Select questions type
Smart cards are less expensive to implement than memory cards.
Free
(True/False)
4.8/5
(37)
Correct Answer:
False
What defines the method for identifying and authenticating users and the level of access that is granted to users?
Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
D
Passwords are considered weaker than passphrases.
Free
(True/False)
4.9/5
(34)
Correct Answer:
True
A network-based IDS is the most common IDS and monitors network traffic on a local network segment.
(True/False)
4.8/5
(39)
Which of the following is an example of three-factor authentication?
(Multiple Choice)
4.9/5
(39)
A deny-by-default stance is less strict than an allow-by-default stance.
(True/False)
4.8/5
(36)
Knowledge factor authentication is also referred to as Type I authentication factor.
(True/False)
4.9/5
(40)
Content-dependent access control is based on subject or object attributes or environmental characteristics.
(True/False)
4.8/5
(29)
Of the options given, which biometric consideration is MOST important?
(Multiple Choice)
5.0/5
(36)
In which access control category do fire extinguishers fall?
(Multiple Choice)
4.8/5
(24)
Which type of IDS analyzes traffic and compares it to normal traffic to determine whether said traffic is a threat?
(Multiple Choice)
4.8/5
(41)
In which access control model is all that is not expressly permitted is forbidden?
(Multiple Choice)
4.8/5
(30)
Which accountability mechanism reviews facility and perimeter protections?
(Multiple Choice)
4.9/5
(28)
Retina scans have a higher accuracy than any other biometric scan.
(True/False)
4.8/5
(20)
Which concept ensures that data is protected from unauthorized modification or data corruption?
(Multiple Choice)
4.8/5
(43)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)