CISSP - Question Bank 01
Test your knowledge of CISSP with these multiple choice questions. Each Question Bank includes 20 practice questions that have been designed to measure your knowledge of key ideas.
A key factor to keep in mind is that guessing is better than not answering a question.
Every single question on the CISSP exam is a four-option multiple choice question with a single correct answer. Some are straightforward, such as asking you to select a definition. Some are a bit more involved, such as asking you to select the appropriate concept or best practice. And some questions present you with a scenario or situation and ask you to select the best response.
StartQ1. What is access?
A. Functions of an object
B. Information flow from objects to subjects
C. Unrestricted admittance of subjects on a system
D. Administration of ACLs
Q2. Which of the following is true?
A. A subject is always a user account.
B. The subject is always the entity that provides or hosts the information or data.
C. The subject is always the entity that receives information about or data from the object.
D. A single entity can never change roles between subject and object.
Q3. What are the elements of the CIA Triad?
A. Confidentiality, integrity, and availability
B. Confidentiality, interest, and accessibility
C. Control, integrity, and authentication
D. Calculations, interpretation, and accountability
Q4. Which of the following types of access control uses fences, security policies, security awareness training, and antivirus software to stop an unwanted or unauthorized activity from occurring?
A. Preventative
B. Detective
C. Corrective
D. Authoritative
Q5. ___________________ access controls are the hardware or software mechanisms used to manage access to resources and systems and to provide protection for those resources and systems.
A. Administrative
B. Logical/technical
C. Physical
D. Preventative
Q6. What is the first step of access control?
A. Accountability logging
B. ACL verification
C. Subject authorization
D. Subject identification
Q7. ___________________ is the process of verifying or testing the validity of a claimed identity.
A. Identification
B. Authentication
C. Authorization
D. Accountability
Q8. Which of the following is an example of a Type 2 authentication factor?
A. Something you have, such as a smart card, ATM card, token device, and memory card
B. Something you are, such as fingerprints, voice print, retina pattern, iris pattern, face shape, palm topology, and hand geometry
C. Something you do, such as type a pass phrase, sign your name, and speak a sentence
D. Something you know, such as a password, personal identification number (PIN), lock combination, pass phrase, mother’s maiden name, and favorite color
Q9. Which of the following is not a reason why using passwords alone is a poor security mechanism?
A. When possible, users choose easy-to-remember passwords, which are therefore easy to guess or crack.
B. Randomly generated passwords are hard to remember, thus many users write them down.
C. Short passwords can be discovered quickly in brute force attacks only when used against a stolen password database file.
D. Passwords can be stolen through many means, including observation, recording and playback, and security database theft.
Q10. Which of the following is not a valid means to improve the security offered by password authentication?
A. Enabling account lockout controls
B. Enforcing a reasonable password policy
C. Using password verification tools and password cracking tools against your own password database file
D. Allowing users to reuse the same password
Q11. What can be used as an authentication factor that is a behavioral or physiological characteristic unique to a subject?
A. Account ID
B. Biometric factor
C. Token
D. IQ
Q12. What does the Crossover Error Rate (CER) for a biometric device indicate?
A. The sensitivity is tuned too high.
B. The sensitivity is tuned too low.
C. The False Rejection Rate and False Acceptance Rate are equal.
D. The biometric device is not properly configured.
Q13. Which if the following is not an example of an SSO mechanism?
A. Kerberos
B. KryptoKnight
C. TACACS
D. SESAME
Q14. ___________________ access controls rely upon the use of labels.
A. Discretionary
B. Role-based
C. Mandatory
D. Nondiscretionary
Q15. A network environment that uses discretionary access controls is vulnerable to which of the following?
A. SYN flood
B. Impersonation
C. Denial of service
D. Birthday attack
Q16. What is the most important aspect of a biometric device?
A. Accuracy
B. Acceptability
C. Enrollment time
D. Invasiveness
Q17. Which of the following is not an example of a deterrent access control?
A. Encryption
B. Auditing
C. Awareness training
D. Antivirus software
Q18. Kerberos provides the security services of ____________________ protection for authentication traffic.
A. Availability and nonrepudiation
B. Confidentiality and authentication
C. Confidentiality and integrity
D. Availability and authorization
Q19. Which of the following forms of authentication provides the strongest security?
A. Password and a PIN
B. One-time password
C. Pass phrase and a smart card
D. Fingerprint
Q20. Which of the following is the least acceptable form of biometric device?
A. Iris scan
B. Retina scan
C. Fingerprint
D. Facial geometry
- Question Bank 00
- Question Bank 01
- Question Bank 02
- Question Bank 03
- Question Bank 04
- Question Bank 05
- Question Bank 06
- Question Bank 07
- Question Bank 08
- Question Bank 09
- Question Bank 10
- Question Bank 11
- Question Bank 12
- Question Bank 13
- Question Bank 14
- Question Bank 15
- Question Bank 16
- Question Bank 17
- Question Bank 18
- Question Bank 19