Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Certified Information Systems Security Professional (CISSP)
Exam 5: ID and Access
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
What is made up of hardware, software, and firmware components that fall within the TCB and enforces the reference monitor concept?
Question 2
Multiple Choice
What could a company do to prevent an employee from accessing a higher level of access by preventing them from even knowing it exists?
Question 3
Multiple Choice
What protocol combines the authentication and authorization functionality?
Question 4
Multiple Choice
What is based on the sensitivity of data and knows what actions should be allowed?
Question 5
Multiple Choice
Biometrics measures unique personal attributes or behaviors. What type of biometric analysis is the most accurate?
Question 6
Multiple Choice
Olivia provided security features that control how users and systems communicate and interact with other systems and resources. What did Olivia create?
Question 7
Multiple Choice
What category is involved with access control layers?
Question 8
Multiple Choice
What type of access control synchronizes with the authentication service by using time or a count as the core piece of the authentication process?
Question 9
Multiple Choice
What broad term encompasses the use of different products to identify, authenticate, and authorize users through automated means?
Question 10
Multiple Choice
Once an organization determines it needs to have access control techniques and technologies in place, it must choose which kind. What kind uses specific rules that indicative what can and cannot happen between a subject and an object?