Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Certified Information Systems Security Professional (CISSP)
Quiz 5: ID and Access
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
What category is involved with access control layers?
Question 2
Multiple Choice
Access control layers consist of administrative controls, physical controls, and technical controls that work at different levels of what?
Question 3
Multiple Choice
What is based on the sensitivity of data and knows what actions should be allowed?
Question 4
Multiple Choice
What could a company do to prevent an employee from accessing a higher level of access by preventing them from even knowing it exists?
Question 5
Multiple Choice
What is defined as a set of objects that a subject is able to access?
Question 6
Multiple Choice
Jeffery is signing in to his network station and is being challenged by a random value called a nonce. Why type of device is this?
Question 7
Multiple Choice
What type of access control synchronizes with the authentication service by using time or a count as the core piece of the authentication process?
Question 8
Multiple Choice
What broad term encompasses the use of different products to identify, authenticate, and authorize users through automated means?
Question 9
Multiple Choice
What security measure analysis is a unique personal attribute or behavior?
Question 10
Multiple Choice
Biometrics measures unique personal attributes or behaviors. What type of biometric analysis is the most accurate?
Question 11
Multiple Choice
Biometrics measures unique personal attributes or behaviors. What type of biometric analysis looks at different peaks and valleys of the hand?
Question 12
Multiple Choice
Olivia provided security features that control how users and systems communicate and interact with other systems and resources. What did Olivia create?
Question 13
Multiple Choice
Once an organization determines it needs to have access control techniques and technologies in place, it must choose which kind. What kind uses specific rules that indicative what can and cannot happen between a subject and an object?