CISSP - Quis 4 - IAM

CISSP - Quis 4 - IAM

Professional Development

25 Qs

quiz-placeholder

Similar activities

AWS Quiz Feb 17

AWS Quiz Feb 17

Professional Development

25 Qs

Understanding Basic Concepts in ICT

Understanding Basic Concepts in ICT

University - Professional Development

20 Qs

Paxton Net2 Systems and Access Control Relays Quiz

Paxton Net2 Systems and Access Control Relays Quiz

Professional Development

21 Qs

B.Voc. TDM 3rd sem- CAD External Practical Exam

B.Voc. TDM 3rd sem- CAD External Practical Exam

University - Professional Development

20 Qs

Pre test- Reading sign

Pre test- Reading sign

7th Grade - Professional Development

20 Qs

Git Introduction

Git Introduction

University - Professional Development

20 Qs

HIPAA Security and Privacy Training

HIPAA Security and Privacy Training

University - Professional Development

20 Qs

Salesforce Admin 20Q - Test 02

Salesforce Admin 20Q - Test 02

Professional Development

20 Qs

CISSP - Quis 4 - IAM

CISSP - Quis 4 - IAM

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

gopi venketesan

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which of the following is not one of the three types of access controls?

Administrative

Personnel

Technical

Physical

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Your company has just opened a call center in India to handle nighttime operations, and you are asked to review the site’s security controls. Specifically, you are asked which of the following is the strongest form of authentication. What will your answer be?

Something you know

Something you are

Password

Token

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization has become worried about recent attempts to gain unauthorized access to the R&D facility. Therefore, you are asked to implement a system that will require individuals to present a password and enter a PIN at the security gate before gaining access. What is this type of system called?

Authorization

Two-factor authentication

Authentication

Three-factor authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the three primary types of authentication?

Something you remember

Something you know

Something you are

Something you have

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While working as a contractor for Widget, Inc., you are asked what the weakest form of authentication is. What will you say?

Passwords

Retina scans

Facial recognition

Tokens

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. You’re preparing a presentation for the senior management of your company. They have asked you to rank the general order of accuracy of the most popular biometric systems, with 1 being the lowest and 5 being the highest. What will you tell them?

  1. (1) fingerprint, (2) palm scan, (3) hand geometry, (4) retina scan, (5) iris scan

  1. (1) fingerprint, (2) palm scan, (3) iris scan, (4) retina scan, (5) hand geometry

  1. (1) palm scan, (2) hand geometry, (3) iris scan, (4) retina scan, (5) fingerprint

  1. (1) hand geometry, (2) palm scan, (3) fingerprint, (4) retina scan, (5) iris scan

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which of the following items is the least important to consider when designing an access control system?

Risk

Threat

Vulnerability

Annual Loss. Expectancy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?