Search Header Logo

CISSP - Quis 4 - IAM

Authored by gopi venketesan

Professional Development

Professional Development

Used 1+ times

CISSP - Quis 4 - IAM
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which of the following is not one of the three types of access controls?

Administrative

Personnel

Technical

Physical

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Your company has just opened a call center in India to handle nighttime operations, and you are asked to review the site’s security controls. Specifically, you are asked which of the following is the strongest form of authentication. What will your answer be?

Something you know

Something you are

Password

Token

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization has become worried about recent attempts to gain unauthorized access to the R&D facility. Therefore, you are asked to implement a system that will require individuals to present a password and enter a PIN at the security gate before gaining access. What is this type of system called?

Authorization

Two-factor authentication

Authentication

Three-factor authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the three primary types of authentication?

Something you remember

Something you know

Something you are

Something you have

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While working as a contractor for Widget, Inc., you are asked what the weakest form of authentication is. What will you say?

Passwords

Retina scans

Facial recognition

Tokens

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. You’re preparing a presentation for the senior management of your company. They have asked you to rank the general order of accuracy of the most popular biometric systems, with 1 being the lowest and 5 being the highest. What will you tell them?

  1. (1) fingerprint, (2) palm scan, (3) hand geometry, (4) retina scan, (5) iris scan

  1. (1) fingerprint, (2) palm scan, (3) iris scan, (4) retina scan, (5) hand geometry

  1. (1) palm scan, (2) hand geometry, (3) iris scan, (4) retina scan, (5) fingerprint

  1. (1) hand geometry, (2) palm scan, (3) fingerprint, (4) retina scan, (5) iris scan

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which of the following items is the least important to consider when designing an access control system?

Risk

Threat

Vulnerability

Annual Loss. Expectancy

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?